Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks.
Mohsen RezvaniAleksandar IgnjatovicElisa BertinoSanjay K. JhaPublished in: IEEE Trans. Dependable Secur. Comput. (2015)
Keyphrases
- data aggregation
- wireless sensor networks
- secure routing
- scheme for wireless sensor networks
- stream cipher
- security mechanisms
- key management
- resource constrained
- routing protocol
- security protocols
- energy efficient
- sensor networks
- cryptographic protocols
- sensor nodes
- chosen plaintext
- routing algorithm
- biological inspired
- malicious nodes
- energy consumption
- data transmission
- residual energy
- base station
- multi hop
- ad hoc networks
- access control
- data dissemination
- secret key
- security analysis
- countermeasures
- security issues
- security requirements
- data collection