Abstract
The lightweight computational nodes being used in WSN
pose particular challenge for many security applications. This
paper investigates a number of security techniques and novel
implementations appropriate for WSN nodes, including
various trade-offs such as implementation complexity, power
dissipation, security flexibility and scalability.
pose particular challenge for many security applications. This
paper investigates a number of security techniques and novel
implementations appropriate for WSN nodes, including
various trade-offs such as implementation complexity, power
dissipation, security flexibility and scalability.
Original language | English |
---|---|
Title of host publication | IET Conference on Wireless Sensor Systems (WSS 2012) |
Publisher | IET |
Pages | 1-5 |
Number of pages | 5 |
ISBN (Electronic) | 978-1-84919-625-3 |
DOIs | |
Publication status | Published - 2012 |
Event | Wireless Sensor Systems 2012 - London, United Kingdom Duration: 18 Jun 2012 → 19 Jun 2012 Conference number: CP601 |
Conference
Conference | Wireless Sensor Systems 2012 |
---|---|
Abbreviated title | WSS 2012 |
Country/Territory | United Kingdom |
City | London |
Period | 18/06/12 → 19/06/12 |
Keywords
- Blom
- AES
- Pairwise key
- Contiki OS
- Mesh