2015
DOI: 10.1007/s11042-014-2443-y
|View full text |Cite
|
Sign up to set email alerts
|

Securing data exchange in wireless multimedia sensor networks: perspectives and challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(15 citation statements)
references
References 77 publications
0
15
0
Order By: Relevance
“…Although these are promising research areas in the field of secure wireless multimedia sensor networks, new challenges may still emerge [14], fostering investigation efforts in this area.…”
Section: Research Directionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Although these are promising research areas in the field of secure wireless multimedia sensor networks, new challenges may still emerge [14], fostering investigation efforts in this area.…”
Section: Research Directionsmentioning
confidence: 99%
“…This particular scenario leads us to survey the state-of-the-art of this subject, comparing different promising solutions. Actually, recent papers have proposed cryptography-based solutions for wireless multimedia sensor networks [4,13,14], but to the best of our knowledge, no survey has been written focusing specifically on cryptography issues in wireless multimedia sensor networks.…”
Section: Introductionmentioning
confidence: 99%
“…Today, the three mainstream technology standards systems in the international community include EPC Global, Ubiquitous ID Center and the ISO standard system [6]. At present, the research field of RFID technology mainly involves antenna type design, frequency selection, anti-collision isolation technology, security authentication and privacy protection [7].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Therefore, incorporating symmetric and asymmetric encryption techniques and designing mechanisms to prevent different types of attacks and key distribution techniques in resource constraint environment are few promising areas of research in secure routing. QoS guarantee and network security management are two critical aspects that will determine the success of future WMSNs [16,17,118,127].…”
Section: Support For Node Mobilitymentioning
confidence: 99%