How not to secure wireless sensor networks revisited: Even if you say it twice it's still not secure.
Chris J. MitchellPublished in: CoRR (2020)
Keyphrases
- wireless sensor networks
- key management
- secure routing
- key management scheme
- sensor networks
- key establishment
- security requirements
- security issues
- lightweight
- database
- energy efficient
- energy efficiency
- user authentication
- authentication scheme
- covert channel
- energy consumption
- base station
- security analysis
- security protocols
- environmental monitoring
- key exchange
- data encryption
- ad hoc networks
- key exchange protocol
- end to end