Harvesting and Threat Aware Security Configuration Strategy for IEEE 802.15.4 Based IoT Networks.
Bomin MaoYuichi KawamotoJiajia LiuNei KatoPublished in: IEEE Commun. Lett. (2019)
Keyphrases
- security problems
- intrusion detection
- management system
- security requirements
- computer networks
- enterprise network
- key management
- security issues
- network security
- cyber security
- privacy issues
- physical layer
- information systems
- mobile computing
- countermeasures
- information security
- complex networks
- security mechanisms
- cloud computing
- security systems
- access control
- rfid systems
- cyber crime