Adaptive and Composite Privacy and Security Mechanism for IoT Communication.
Swaminathan SeetharamanSudipta GhoshPublished in: ICIN (2016)
Keyphrases
- security mechanisms
- resource constrained
- security problems
- security issues
- rfid systems
- security systems
- access control
- cloud computing
- security threats
- key management
- wireless sensor networks
- sensor networks
- smart card
- resource constraints
- security measures
- security requirements
- data sets
- management system
- operating system
- security protocols
- privacy preserving
- personal information
- location information
- embedded systems
- information security
- information systems
- data mining