Adaptation of the DDS Security Standard for Resource-Constrained Sensor Networks.
Kai BeckmanJonas ReiningerPublished in: SIES (2018)
Keyphrases
- resource constrained
- sensor networks
- security mechanisms
- key management
- wireless sensor networks
- sensor nodes
- visual sensor networks
- data collection
- key establishment
- data streams
- energy efficient
- security protocols
- heterogeneous sensor networks
- environmental monitoring
- communication cost
- energy consumption
- sensor data
- key management scheme
- resource constraints
- underwater acoustic
- wireless sensor nodes
- embedded systems
- intrusion detection
- access control
- communication bandwidth
- key distribution
- information security
- security issues
- energy efficiency
- base station
- source code
- metaheuristic
- data aggregation
- routing protocol
- security policies