A back-end offload architecture for security of resource-constrained networks.
Jiyong HanDaeyoung KimPublished in: NCA (2016)
Keyphrases
- resource constrained
- back end
- security mechanisms
- key management
- resource constraints
- wireless sensor networks
- sensor networks
- resource limitations
- data management
- user friendly
- data types
- rfid tags
- building blocks
- multipath
- preprocessing
- sensor nodes
- tcp ip
- embedded systems
- real time
- database systems
- databases
- intrusion detection
- management system
- data sets