Abstract
The lightweight computational nodes being used in WSN
pose particular challenge for many security applications. This
paper investigates a number of security techniques and novel
implementations appropriate for WSN nodes, including
various trade-offs such as implementation complexity, power
dissipation, security flexibility and scalability.
pose particular challenge for many security applications. This
paper investigates a number of security techniques and novel
implementations appropriate for WSN nodes, including
various trade-offs such as implementation complexity, power
dissipation, security flexibility and scalability.
Original language | English |
---|---|
Title of host publication | Wireless Sensor Systems 2012 |
Publisher | IET |
Publication status | Published - 2012 |
Event | Wireless Sensor Systems 2012 - London, United Kingdom Duration: 18 Jun 2012 → 20 Jun 2012 |
Conference
Conference | Wireless Sensor Systems 2012 |
---|---|
Country/Territory | United Kingdom |
City | London |
Period | 18/06/12 → 20/06/12 |
Keywords
- Blom
- AES
- Pairwise key
- Contiki OS
- Mesh