An energy-efficient lightweight security protocol for optimal resource provenancein wireless sensor networks.
Sujesh LalJoe Prathap P. MPublished in: Turkish J. Electr. Eng. Comput. Sci. (2020)
Keyphrases
- lightweight
- wireless sensor networks
- security protocols
- key management
- energy efficient
- authentication protocol
- rfid tags
- sensor networks
- sensor nodes
- resource constrained
- energy consumption
- data collection
- energy efficiency
- routing protocol
- routing algorithm
- multi hop
- resource constraints
- security mechanisms
- security services
- dos attacks
- maximum lifetime
- mac protocol
- base station
- data gathering
- public key
- development environments
- node selection
- cloud computing