Verifying Security Protocols for Sensor Networks Using Algebraic Specification Techniques.
Iakovos OuranosPetros S. StefaneasPublished in: CAI (2007)
Keyphrases
- sensor networks
- security protocols
- resource constrained
- security mechanisms
- wireless sensor networks
- key management
- automated design
- sensor data
- underwater acoustic
- security properties
- environmental monitoring
- sensor nodes
- security services
- data collection
- energy consumption
- data streams
- communication cost
- authentication protocol
- communication bandwidth
- secure communication
- energy efficient
- cryptographic protocols
- security requirements
- routing protocol
- data aggregation
- rfid tags
- visual sensor networks
- key distribution