New adversary and new threats: security in unattended sensor networks.
Di MaClaudio SorienteGene TsudikPublished in: IEEE Netw. (2009)
Keyphrases
- sensor networks
- resource constrained
- sensor nodes
- security mechanisms
- information security
- security services
- security issues
- key establishment
- wireless sensor networks
- key management
- cyber security
- wireless sensor
- sensor data
- data collection
- heterogeneous sensor networks
- wireless sensor nodes
- underwater acoustic
- environmental monitoring
- energy efficient
- communication cost
- network security
- data streams
- energy efficiency
- communication bandwidth
- data aggregation
- energy consumption
- sensor web
- base station
- key management scheme
- visual sensor networks
- access control
- security requirements
- sensor readings
- network connectivity
- monitoring system
- mobile wireless
- security protocols
- data sets
- personal information
- wireless communication
- video coding
- intrusion detection
- reduce communication cost