Article ID Journal Published Year Pages File Type
6878403 Ad Hoc Networks 2018 35 Pages PDF
Abstract
This paper is a survey of the current work to understand the available security measures in the literature for constrained environments. First of all, this paper introduces the specific problem of security in constrained environments and the need for a consistent solution. The necessary set of security measures that must be present in an architecture is reviewed. Second, an overview of such consistent solutions in the literature is provided. Finally, a comparison of these solutions is performed based on the security and constraint aspects.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,