Adaptive security established on the requirements and resource abilities of network nodes | IEEE Conference Publication | IEEE Xplore