Enhancing S-LEACH security for wireless sensor networks.
Mona El SaadawyEman ShaabanPublished in: EIT (2012)
Keyphrases
- wireless sensor networks
- key management
- key establishment
- sensor networks
- energy efficient
- sensor nodes
- key management scheme
- base station
- wireless sensor
- data aggregation
- resource constrained
- malicious nodes
- energy consumption
- wireless sensor nodes
- data transmission
- energy efficiency
- environmental monitoring
- routing algorithm
- routing protocol
- security issues
- network lifetime
- security systems
- cluster head
- security mechanisms
- energy aware
- key distribution
- intrusion detection
- data gathering
- network security
- wireless communication
- information security
- access control
- multi hop
- data streams
- computer security
- topology control
- residual energy