Optimization coverage conserving protocol with authentication in wireless sensor networks.
Zeyu SunLongxing LiXuelun LiXiaofei XingYuanbo LiPublished in: Int. J. Distributed Sens. Networks (2017)
Keyphrases
- wireless sensor networks
- authentication protocol
- lightweight
- optimization algorithm
- security analysis
- data dissemination
- energy consumption
- energy efficient
- key distribution
- node selection
- residual energy
- mac protocol
- data aggregation
- authentication scheme
- optimization problems
- mutual authentication
- key establishment
- sensor networks
- resource constrained
- formal analysis
- routing algorithm
- security model
- user authentication
- security protocols
- trusted third party
- key agreement protocol
- energy efficiency
- key agreement
- shortest path
- virtual private network
- secure routing