Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks.
Muhammad Khurram KhanYang XiangShi-Jinn HorngHsiao-Hwa ChenPublished in: Int. J. Distributed Sens. Networks (2013)
Keyphrases
- wireless sensor networks
- security services
- privacy concerns
- key management
- malicious nodes
- security issues
- policy enforcement
- access control
- trust relationships
- access control models
- statistical databases
- personal information
- security mechanisms
- information security
- security and privacy issues
- security concerns
- data privacy
- privacy preserving
- electronic transactions
- privacy issues
- preserving privacy
- resource constrained
- data security
- security protocols
- wireless sensor
- security risks
- privacy requirements
- security measures
- sensor networks
- personal data
- secure multiparty computation
- trust management
- security properties
- identity management
- security management
- privacy preserving data mining
- security threats
- trust model
- enterprise network
- trusted computing
- sensor nodes
- wireless communication
- biometric template
- energy consumption
- intrusion detection
- privacy enhancing
- key establishment
- confidential information
- privacy policies
- electronic payment
- cloud computing
- public key infrastructure
- private information
- sensitive data
- authentication protocol
- ad hoc networks
- public key cryptography
- social awareness
- security policies
- electronic commerce
- network security
- sensitive information
- semi honest
- digital signature