Security Enhancing Compiler for Localization Schemes in Pervasive Sensor Networks.
Ji Young ChunYong Ho KimJung Yeon HwangDong Hoon LeePublished in: ACIS-ICIS (2009)
Keyphrases
- sensor networks
- wireless sensor networks
- key management scheme
- key establishment
- wireless sensor
- sensor data
- key management
- resource constrained
- environmental monitoring
- heterogeneous sensor networks
- information security
- sensor nodes
- data collection
- underwater acoustic
- wireless sensor nodes
- data streams
- energy efficient
- energy consumption
- communication cost
- security mechanisms
- intrusion detection
- security issues
- access control
- computing environments
- provably secure
- base station
- context aware
- sensor readings
- routing protocol
- mobile wireless
- security requirements
- security policies
- energy efficiency
- mobile sensor networks
- data gathering
- security model
- sensor web
- communication bandwidth