The algorithm design manual
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Theoretical Computer Science - Mathematical foundations of computer science
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Security of ultra-lightweight RFID authentication protocols and its improvements
ACM SIGOPS Operating Systems Review
A Collaborative Network Security Platform in P2P Networks
NISS '09 Proceedings of the 2009 International Conference on New Trends in Information and Service Science
FORTUNA-A framework for the design and development of hardware-based secure systems
Journal of Systems and Software
Hi-index | 0.00 |
There is a huge demand for wireless sensors and RFID tags for remote surveillance and tracking. However, in order for such technologies to gain wide acceptance in industry, there needs to be strong security integrated into them. Traditional cryptographic schemes are infeasible due to hardware, computation, and power constraints. To that end, we introduce a new security paradigm, namely security fusion. In this approach, strong security properties are synthesized from weaker point-to-point properties, thereby minimizing the resource requirements at each node without compromising the system-level security. In this paper, we describe the concept of security fusion and give a motivation example using finite state machines.