Performance evaluation of end-to-end security protocols in an Internet of Things.
Antonio De RubertisLuca MainettiVincenzo MighaliLuigi PatronoIlaria SergiMaria Laura StefanizziStefano PascaliPublished in: SoftCOM (2013)
Keyphrases
- end to end
- security protocols
- key management
- ad hoc networks
- automated design
- admission control
- congestion control
- wireless ad hoc networks
- security mechanisms
- artificial immune algorithm
- multipath
- mobile devices
- application layer
- service delivery
- rfid tags
- security requirements
- smart card
- wireless sensor networks
- transport layer