Keyphrases
- security protocols
- cryptographic algorithms
- automated design
- security properties
- security mechanisms
- security services
- key management
- artificial immune algorithm
- secure communication
- authentication protocol
- rfid tags
- cryptographic protocols
- resource constrained
- cost effective
- sensor data
- data processing
- sensor networks