Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6878403 | Ad Hoc Networks | 2018 | 35 Pages |
Abstract
This paper is a survey of the current work to understand the available security measures in the literature for constrained environments. First of all, this paper introduces the specific problem of security in constrained environments and the need for a consistent solution. The necessary set of security measures that must be present in an architecture is reviewed. Second, an overview of such consistent solutions in the literature is provided. Finally, a comparison of these solutions is performed based on the security and constraint aspects.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Philippe Pittoli, Pierre David, Thomas Noël,