Trust, Security, and Privacy in Next-Generation Wireless Sensor Networks 2014.
Muhammad Khurram KhanYang XiangShi-Jinn HorngHsiao-Hwa ChenPublished in: Int. J. Distributed Sens. Networks (2015)
Keyphrases
- wireless sensor networks
- security services
- key management
- privacy concerns
- security issues
- malicious nodes
- policy enforcement
- security mechanisms
- resource constrained
- security concerns
- statistical databases
- trust relationships
- access control
- access control models
- personal information
- information security
- electronic transactions
- security management
- security and privacy issues
- personal data
- privacy preserving
- security threats
- data security
- security requirements
- sensor networks
- data privacy
- enterprise network
- sensitive data
- security protocols
- security measures
- privacy issues
- security risks
- wireless sensor
- security properties
- rfid systems
- public key infrastructure
- trust management
- identity management
- confidential information
- sensor nodes
- protection mechanisms
- privacy requirements
- energy consumption
- trusted computing
- social awareness
- electronic payment
- preserving privacy
- security policies
- secure multiparty computation
- electronic commerce
- key establishment
- routing protocol
- wireless communication
- private information
- ad hoc networks
- biological inspired
- biometric template
- authentication protocol
- third party
- social network sites
- network security
- trust model
- digital signature
- privacy protection
- network nodes
- privacy policies
- outsourced databases