How Secure are Secure Localization Protocols in WSNs?
Chérifa BoucettaMohamed Ali KâafarMarine MinierPublished in: S-CUBE (2010)
Keyphrases
- secure routing
- key management
- key establishment
- cryptographic protocols
- wireless sensor networks
- security protocols
- key distribution
- security properties
- authentication protocol
- security requirements
- security services
- energy consumption
- sensor networks
- key agreement protocol
- key exchange
- authentication scheme
- security analysis
- security issues
- lightweight
- sensor nodes
- base station
- group communication
- security mechanisms
- resource constrained