A Survey on Security and Privacy Protocols for Cognitive Wireless Sensor Networks.
Jaydip SenPublished in: CoRR (2013)
Keyphrases
- wireless sensor networks
- secure multiparty computation
- key establishment
- security services
- key management
- privacy preserving
- security properties
- security issues
- authentication protocol
- security protocols
- security mechanisms
- cryptographic protocols
- resource constrained
- mutual authentication
- sensor networks
- semi honest
- security concerns
- statistical databases
- homomorphic encryption
- key distribution
- trusted third party
- preserving privacy
- ns simulator
- privacy preserving data mining
- privacy concerns
- energy efficient
- security requirements
- security threats
- security analysis
- wireless sensor
- rfid systems
- security and privacy issues
- information security
- sensitive data
- data privacy
- personal data
- access control
- communication protocols
- data security
- security measures
- privacy protection
- key agreement protocol
- multi hop
- security risks
- sensor nodes
- energy consumption
- privacy issues
- smart card
- rfid tags
- routing algorithm
- routing protocol
- privacy enhancing
- key exchange
- personal information
- base station
- medium access control
- messages exchanged
- outsourced databases
- privacy requirements
- user privacy
- identity management
- cognitive radio
- differential privacy
- multi party
- energy efficiency
- data sharing
- network security
- wireless communication
- intrusion detection