Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms.
Christian T. ZengerAbhijit K. AmbekarFredrik WinzerThomas PöppelmannHans D. SchottenChristof PaarPublished in: BalkanCryptSec (2014)
Keyphrases
- resource constrained
- security mechanisms
- security architecture
- cross layer
- routing protocol
- sensor networks
- wireless sensor networks
- wireless networks
- mobile ad hoc networks
- resource constraints
- video streaming
- quality of service
- multipath
- application layer
- key management
- energy consumption
- sensor nodes
- ad hoc networks
- embedded systems
- routing algorithm
- intelligent agents
- lightweight
- access control
- databases