Title:
SecurityinDistributedEmbeddedSystems Download
Description: Information security was first explored in the context of communication systems. When two
entities send or receive sensitive data using public networks or communication channels that are
easily accessible by could-be attackers, they should generally provide the basic security
functions such as data confidentiality, data integrity, and peer authentication. Confidentiality,
integrity, and authentication services are critical to preventing an adversary from compromising
the security of a distributed sensor network. Key management is likewise critical to establishing
the keys necessary to provide this protection.
To Search:
File list (Check if you may need any files):
Security in Distributed Embedded Systems.pdf