Trusted Computing for Embedded Systems 2014
DOI: 10.1007/978-3-319-09420-5_5
|View full text |Cite
|
Sign up to set email alerts
|

Low Power Wireless Sensor Networks: Secure Applications and Remote Distribution of FW Updates with Key Management on WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 27 publications
0
3
0
Order By: Relevance
“…High-speed fixed and wireless networks connect sensors and smart systems that allow information to be analyzed in near real-time to improve operation performance [24]. Smart phones, the Semantic Web, cloud computing, and IoT promote real world interfaces and applications [41] [49], and embedding the latest advances in mobile and pervasive computing, wireless networks, middleware and agent technologies into the physical spaces of the city [42].…”
Section: A Smart City Definitionsmentioning
confidence: 99%
See 1 more Smart Citation
“…High-speed fixed and wireless networks connect sensors and smart systems that allow information to be analyzed in near real-time to improve operation performance [24]. Smart phones, the Semantic Web, cloud computing, and IoT promote real world interfaces and applications [41] [49], and embedding the latest advances in mobile and pervasive computing, wireless networks, middleware and agent technologies into the physical spaces of the city [42].…”
Section: A Smart City Definitionsmentioning
confidence: 99%
“…The decision making through combined intelligence of multiple nodes can help in taking better decisions [42] 8. Open APIs for citizens to enable service creation: Smart cities can generate a large number data sets from networks of devices and sensors.…”
Section: B Iot Network Requirementsmentioning
confidence: 99%
“…In addition, securing data aggregation operations and node localization schemes remains a challenge. Even so, various solutions are proposed for designing secure sensor networks [23,68,75]. Also, bio-inspired techniques promise an outlook for secure sensor networks.…”
Section: Security In Sensor Networkmentioning
confidence: 99%