The lightweight computational nodes being used in WSN pose particular challenge for many security applications. This paper investigates a number of security techniques and novel implementations appropriate for WSN nodes, including various trade-offs such as implementation complexity, power dissipation, security flexibility and scalability.
展开▼