On the evolution of adversary models in security protocols: from the beginning to sensor networks.
Virgil D. GligorPublished in: AsiaCCS (2007)
Keyphrases
- sensor networks
- wireless sensor networks
- security protocols
- environmental monitoring
- energy consumption
- sensor data
- data streams
- resource constrained
- energy efficient
- sensor nodes
- communication cost
- data collection
- sensor readings
- underwater acoustic
- communication bandwidth
- mobile wireless
- data aggregation
- data gathering
- data sets
- automated design
- sensor web