Security support for in-network processing in Wireless Sensor Networks.
Jing DengRichard HanShivakant MishraPublished in: SASN (2003)
Keyphrases
- wireless sensor networks
- key management
- wireless sensor
- wireless sensor nodes
- sensor networks
- network management
- sensor nodes
- key management scheme
- malicious nodes
- data gathering
- resource limitations
- energy efficient
- real time
- data aggregation
- energy consumption
- security protection
- computer networks
- security policies
- intrusion detection
- intrusion detection and prevention
- virtual private network
- network connection
- peer to peer
- base station
- network security
- network structure
- resource constrained
- security requirements
- data transmission
- cyber attacks
- mac protocol
- denial of service attacks
- routing algorithm
- end users
- wireless communication
- key establishment
- communication networks
- complex networks
- secure routing