Next: Data Confidentiality
Up: SPINS: Security Protocols for
Previous: Design Guidelines
In this section, we formalize the security properties required by sensor
networks, and show how they are directly applicable in a typical sensor network.
Next: Data Confidentiality
Up: SPINS: Security Protocols for
Previous: Design Guidelines
Adrian Perrig
Fri Jun 1 22:51:44 PDT 2001