An automatic test platform to verify the security functions for secure WIA-PA wireless sensor networks.
Min WeiKeecheon KimPublished in: Int. J. Distributed Sens. Networks (2016)
Keyphrases
- wireless sensor networks
- key management
- key establishment
- wireless sensor
- key management scheme
- security issues
- security requirements
- security measures
- security level
- secure routing
- security protocols
- sensor networks
- resource constrained
- security management
- security mechanisms
- security services
- sensor nodes
- data encryption
- ad hoc networks
- security properties
- information security
- energy consumption
- electronic voting
- routing protocol
- cryptographic protocols
- energy efficient
- diffie hellman
- security policies
- stream cipher
- routing algorithm
- security patterns
- data security
- key distribution
- security architecture
- security model
- provably secure
- sensitive data
- key exchange
- secure communication
- user authentication
- security analysis
- authentication scheme
- previously mentioned
- access control
- key exchange protocol
- authentication protocol
- digital signature
- public key infrastructure
- unauthorized access
- energy efficiency
- encryption scheme
- factor authentication
- biological inspired
- key agreement protocol
- public key cryptography
- digital signature scheme