Abstract | ||
---|---|---|
There is a huge demand for wireless sensors and RFID tags for remote surveillance and tracking. However, in order for such technologies to gain wide acceptance in industry, there needs to be strong security integrated into them. Traditional cryptographic schemes are infeasible due to hardware, computation, and power constraints. To that end, we introduce a new security paradigm, namely security fusion. In this approach, strong security properties are synthesized from weaker point-to-point properties, thereby minimizing the resource requirements at each node without compromising the system-level security. In this paper, we describe the concept of security fusion and give a motivation example using finite state machines. |
Year | Venue | Keywords |
---|---|---|
2011 | HotSec | RFID tag,power constraint,huge demand,finite state machine,system-level security,new security paradigm,strong security,motivation example,security fusion,strong security property,new security architecture,resource-constrained environment |
Field | DocType | Citations |
Security through obscurity,Security engineering,Software security assurance,Computer security,Computer science,Security service,Cloud computing security,Security information and event management,Enterprise information security architecture,Computer security model | Conference | 2 |
PageRank | References | Authors |
0.40 | 5 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Suku Nair | 1 | 140 | 12.00 |
Subil Abraham | 2 | 28 | 3.29 |
Omar Al Ibrahim | 3 | 17 | 4.12 |