scholar.google.com › citations
Abstract—The deployment of wireless sensor networks may endanger the privacy of people monitored on purpose or un- intentionally. To enhance the control of ...
Towards this end, we design an architecture relying on granular access control and filtering of relevant information, which can be easily integrated with ...
Apr 26, 2024 · Therefore, this work proposes a secure communication protocol with fine-grained access control for UWSN that support secure and efficient one-to ...
Missing: (Extended | Show results with:(Extended
We propose a fully distributed access control method, which has several authorities instead of one. Each sensor has a set of attributes and each user has an ...
Feb 4, 2016 · Consequently, data insecurity becomes a big concern. This study, therefore, proposes a fine-grained access control system which only requires ...
Missing: (Extended | Show results with:(Extended
Abstract—A distributed access control module in wireless sen- sor networks (WSNs) allows the network to authorize and grant user access privileges for ...
Missing: (Extended | Show results with:(Extended
People also ask
What are the security practices for wireless sensor network security?
What are the different security requirements in a generic wireless sensor network?
What are the major constraints of wireless sensor networks?
What are the hardware components and design constraints in WSN?
Abstract. The evolving realities of Wireless Sensor Network (WSN) deployed to various terrain of life require serving multiple applications.
Missing: (Extended | Show results with:(Extended
This paper presents a policy-driven security architecture for wireless sensor networks that addresses the concern of fine-grained access control and secure ...
Missing: (Extended | Show results with:(Extended
Feb 13, 2018 · This Hidra protocol, based on symmetric key cryptography, relies on a three-party architecture to enable multi-step authorization as well as the ...
This paper provides an overview of security threats and attacks, outlines the security requirements and presents a state-of-the-art survey on access control ...