An Efficient Security Scheme for the Internet of Things with Resource-Constrained Devices.
Xin-Wen WuWaleed FaragSanwar AliSiddhivinayak KulkarniPublished in: UEMCON (2019)
Keyphrases
- access control
- resource constrained
- security mechanisms
- mobile devices
- resource constraints
- embedded systems
- security requirements
- sensor networks
- key management
- wireless sensor networks
- rfid tags
- resource limitations
- visual sensor networks
- physical world
- rfid technology
- real time
- lightweight
- context aware
- peer to peer
- data sets