@inproceedings{590acf41603642ca9db318d587cdc9a5,
title = "Setting up secure wireless sensor networks",
abstract = "The current state for security research in sensor networks presents many approaches for all possible security services. Upon network deployment protocols must be selected and made to work together so that they meet application requirements like security level, dynamics or power consumption. This is a non-trivial process and requires an expert in both security and networks, and can definitely not be performed by a user. This paper identifies a set of application-space parameters which controls security requirements. A method of selecting security protocols based on those parameters is presented; it allows non-expert users to configure the security without any knowledge of networks, protocols or security. It also allows the automation of the security configuration process.",
keywords = "Configuration, Parameters, Security, Wireless sensor networks",
author = "Victor Cionca and Thomas Newe and Vasile Dǎd{\^a}rlat",
year = "2009",
doi = "10.1109/ICCP.2009.5284740",
language = "English",
isbn = "9781424450077",
series = "Proceedings - 2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing, ICCP 2009",
pages = "335--338",
booktitle = "Proceedings - 2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing, ICCP 2009",
note = "2009 IEEE 5th International Conference on Intelligent Computer Communication and Processing, ICCP 2009 ; Conference date: 27-08-2009 Through 29-08-2009",
}