On Security Provision in Demanding Cyberphysical Bluetooth based Systems
Abstract
References
Recommendations
Wireless sensor networks: learning and teaching
SIGITE '07: Proceedings of the 8th ACM SIGITE conference on Information technology educationThere have been many response deficiencies cited regarding a fire department's ability to fight a structure fire. The attacks on the World Trade Center on 9/11 highlighted many of these problems and demanded the attention of the world. Wireless Sensor ...
Adaptive Security Framework for Wireless Sensor Networks
INCOS '12: Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative SystemsWireless Sensor Networks are used in a large number of tracking and monitoring applications. The level of security required by an application depends on the threat level, available resources, and security requirements. In this paper, we present a ...
Bluetooth scatternets: criteria, models and classification
Bluetooth ad hoc networks are constrained by a master/slave configuration, in which one device is the master and controls the communication with the slave devices. The master and up to seven active slave devices can form a small Bluetooth network called ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/b07cc7f4-4d8c-414f-8120-2eddebfcd259/2984393.cover.jpg)
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 62Total Downloads
- Downloads (Last 12 months)1
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in