|
Volumn , Issue , 2010, Pages 58-65
|
Considerations on security in ZigBee networks
|
Author keywords
Key management; Security; ZigBee
|
Indexed keywords
APPLICATION LAYERS;
ENERGY PROFILE;
FORWARD SECURITY;
KEY MANAGEMENT;
LOW-POWER DEVICES;
REFERENCE SECURITY MODEL;
SECURITY;
SECURITY MANAGEMENT;
SECURITY MODEL;
ZIG-BEE;
ZIGBEE NETWORKS;
MOBILE COMPUTING;
SECURITY OF DATA;
SENSOR NETWORKS;
SENSOR NODES;
SPECIFICATIONS;
TECHNICAL PRESENTATIONS;
TELECOMMUNICATION EQUIPMENT;
WIRELESS NETWORKS;
UBIQUITOUS COMPUTING;
|
EID: 77958554487
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/SUTC.2010.15 Document Type: Conference Paper |
Times cited : (43)
|
References (17)
|