Security in mobile ad hoc and sensor networks: part II [guest editorial].
Stamatios V. KartalopoulosHsiao-Hwa ChenMário M. FreireLiwen HePramode K. VermaPublished in: IEEE Commun. Mag. (2008)
Keyphrases
- sensor networks
- mobile sensor networks
- mobile wireless
- network connectivity
- key establishment
- wireless sensor networks
- resource constrained
- wireless sensor
- heterogeneous sensor networks
- sensor nodes
- environmental monitoring
- sensor data
- data streams
- communication cost
- key management
- security mechanisms
- mobile nodes
- data aggregation
- data collection
- security issues
- mobile phone
- energy consumption
- intrusion detection
- underwater acoustic
- energy efficient
- data dissemination
- access control
- mobile networks
- base station
- wireless sensor nodes
- mobile devices
- communication bandwidth
- network security
- routing protocol
- sensor web
- energy efficiency
- mobile users
- data gathering
- wireless networks
- security requirements
- sensor readings
- mobile applications
- information security
- mobile computing
- data distribution
- pairwise
- data sets