Providing Transparent Security Services to Sensor Networks.
Hamed SoroushMastooreh SalajeghehTassos DimitriouPublished in: ICC (2007)
Keyphrases
- sensor networks
- security services
- resource constrained
- wireless sensor networks
- key management
- security mechanisms
- sensor data
- sensor nodes
- security protocols
- data collection
- energy consumption
- underwater acoustic
- communication cost
- mobile sensor networks
- personal information
- base station
- data streams
- communication bandwidth
- routing protocol
- data sets
- computer networks
- government services
- information security
- end users