Evaluating CoAP End to End Security for Constrained Wireless Sensor Networks.
Apostolos P. FournarisSpilios GiannoulisChristos KoulamasPublished in: NTMS (2019)
Keyphrases
- end to end
- wireless sensor networks
- multi hop
- key management
- ad hoc networks
- wireless sensor
- energy efficient
- sensor networks
- high bandwidth
- multipath
- routing algorithm
- information security
- wireless ad hoc networks
- admission control
- congestion control
- data aggregation
- transport layer
- intrusion detection
- energy consumption
- resource constrained
- sensor nodes
- security policies
- network security
- energy efficiency
- mac protocol
- physical layer
- network layer
- routing protocol
- application layer
- wifi
- base station