A cross-layer approach for integrating security mechanisms in sensor networks architectures.
Rodrigo RomanJavier LópezPablo NajeraPublished in: Wirel. Commun. Mob. Comput. (2011)
Keyphrases
- sensor networks
- resource constrained
- cross layer
- security mechanisms
- routing protocol
- wireless sensor networks
- sensor nodes
- mobile ad hoc networks
- wireless networks
- ad hoc networks
- energy consumption
- application layer
- network topology
- routing algorithm
- sensor data
- quality of service
- video streaming
- energy efficient
- multimedia services
- energy efficiency
- security issues
- data transmission
- access control
- key management
- base station
- smart card
- wireless ad hoc networks
- security protocols
- security requirements
- multi hop
- real time
- scalable video
- information systems
- data streams
- operating system
- mobile nodes
- multimedia content
- resource constraints
- security policies