Login / Signup
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks.
Sencun Zhu
Sanjeev Setia
Sushil Jajodia
Peng Ning
Published in:
ACM Trans. Sens. Networks (2007)
Keyphrases
</>
sensor networks
data collection
sensor data
data sets
environmental monitoring
data gathering
wireless sensor networks
data distribution
sensor readings
data streams
end users
database
communication bandwidth
heterogeneous sensor networks
resource constrained
communication cost
energy consumption