End-to-End Security for the IoT.
James DooleyPublished in: Intelligent Environments (Workshops) (2016)
Keyphrases
- end to end
- key management
- security problems
- ad hoc networks
- security issues
- high bandwidth
- admission control
- congestion control
- wireless ad hoc networks
- information security
- multipath
- security policies
- access control
- transport layer
- network security
- intrusion detection
- management system
- multi hop
- content delivery
- location information
- image quality