A Thourough Survey on Security over Sensor Networks
- 2016
- 32
Introduction, Sensor Networks Applications, Sensor Networks Constraints, Security Requirements, Keying Protocols, Authentication, Symmetric Encryption Schemes, Security Protocol for Sensor Networks (SPINS), Conclusion.