Title
Security fusion: a new security architecture for resource-constrained environments
Abstract
There is a huge demand for wireless sensors and RFID tags for remote surveillance and tracking. However, in order for such technologies to gain wide acceptance in industry, there needs to be strong security integrated into them. Traditional cryptographic schemes are infeasible due to hardware, computation, and power constraints. To that end, we introduce a new security paradigm, namely security fusion. In this approach, strong security properties are synthesized from weaker point-to-point properties, thereby minimizing the resource requirements at each node without compromising the system-level security. In this paper, we describe the concept of security fusion and give a motivation example using finite state machines.
Year
Venue
Keywords
2011
HotSec
RFID tag,power constraint,huge demand,finite state machine,system-level security,new security paradigm,strong security,motivation example,security fusion,strong security property,new security architecture,resource-constrained environment
Field
DocType
Citations 
Security through obscurity,Security engineering,Software security assurance,Computer security,Computer science,Security service,Cloud computing security,Security information and event management,Enterprise information security architecture,Computer security model
Conference
2
PageRank 
References 
Authors
0.40
5
3
Name
Order
Citations
PageRank
Suku Nair114012.00
Subil Abraham2283.29
Omar Al Ibrahim3174.12