Towards Implementation of Robust and Low-Cost Security Primitives for Resource-Constrained IoT Devices.
Fatemeh TehranipoorPublished in: CoRR (2018)
Keyphrases
- resource constrained
- rfid tags
- key management
- low cost
- security mechanisms
- embedded systems
- security problems
- resource constraints
- resource limitations
- visual sensor networks
- wireless sensor networks
- security issues
- reconfigurable hardware
- sensor networks
- multipath
- intrusion detection
- cost effective
- real time
- sensor nodes
- mobile devices
- data sets