Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security.
M. Razvi DoomunK. M. S. SoyjaudahPublished in: Int. J. Netw. Secur. (2009)
Keyphrases
- resource constrained
- key management
- visual sensor networks
- security mechanisms
- security protocols
- wireless sensor networks
- resource constraints
- sensor networks
- wireless communication
- secure communication
- resource limitations
- rfid tags
- security properties
- multipath
- embedded systems
- encryption scheme
- wireless networks
- low cost
- information security
- cost effective
- real time
- network security
- leader follower
- mobile devices