The concept of security for tiny artifacts has been studied in a widerange of aspects, from authentication through data integrity tointrusion detection. This chapter provides a broad overview of some ofthe techniques developed for constrained devices where computationalpower, memory capacity, and energy limitations enforce slightlydifferent approaches to these problems, when compared to standardhigh-end devices. In the following, we present ideas that leverageunique properties of sensor networks (also wireless sensor networks) toprovide consistent and secure systems for information gathering andsensing.
CITATION STYLE
Błaśkiewicz, P., & Kutyłowski, M. (2011). Security and Trust in Sensor Networks (pp. 697–739). https://doi.org/10.1007/978-3-642-14849-1_22
Mendeley helps you to discover research relevant for your work.