Security in application layer of radar sensor networks: detect friends or foe.
Zongjie CaoLijia ChenPublished in: Secur. Commun. Networks (2015)
Keyphrases
- sensor networks
- application layer
- network layer
- physical layer
- key establishment
- wireless sensor networks
- routing protocol
- end to end
- energy efficient
- sensor data
- energy consumption
- communication cost
- resource constrained
- sensor nodes
- heterogeneous sensor networks
- data aggregation
- base station
- cross layer
- energy efficiency
- ddos attacks
- key management
- network security
- video streaming
- information security
- communication bandwidth
- access control
- data streams
- overlay network
- security requirements
- security issues
- wireless communication
- intrusion detection
- sensor web
- multi hop
- quality assessment
- ad hoc networks
- security policies