Secure and resilient scheme for data protection in unattended wireless sensor networks.
Katarzyna KapustaGérard MemmiHassan NouraPublished in: CSNet (2017)
Keyphrases
- data protection
- wireless sensor networks
- symmetric key
- key management
- resource constrained
- sensor nodes
- access control
- data security
- key distribution
- privacy protection
- secret sharing scheme
- sensor networks
- security analysis
- security mechanisms
- personal data
- information security
- provably secure
- energy consumption
- sensitive information
- data collection
- routing protocol
- data sets
- data privacy
- database
- e government
- mobile agents
- data integrity
- ad hoc networks
- data mining
- secure communication