Security Defenses for Vulnerable Medical Sensor Network.
Renchi YanVaibhav Chetan ShahTeng XuMiodrag PotkonjakPublished in: ICHI (2014)
Keyphrases
- security threats
- sensor networks
- resource constrained
- security mechanisms
- key management
- security issues
- wireless sensor networks
- sensor data
- sensor nodes
- energy consumption
- environmental monitoring
- data collection
- underwater acoustic
- network security
- communication cost
- sensor readings
- data aggregation
- security requirements
- visual sensor networks
- base station
- information security
- energy efficient
- mobile sensor networks
- security policies
- energy efficiency
- data streams
- communication bandwidth
- sensor web
- routing protocol
- access control
- multi hop
- intrusion detection
- computer systems
- security protocols
- camera network
- sensing devices
- rfid tags