Secure authentication and integrity techniques for randomized secured routing in WSN.
U. Senthil kumaranIlango ParamasivamPublished in: Wirel. Networks (2015)
Keyphrases
- integrity verification
- routing protocol
- wireless sensor networks
- data aggregation
- routing algorithm
- secure routing
- biological inspired
- key management
- data encryption
- ad hoc networks
- key distribution
- authentication mechanism
- data confidentiality
- user authentication
- security mechanisms
- energy efficient
- password authentication
- authentication scheme
- resource constrained
- security services
- security requirements
- identity management
- copyright protection
- information security
- sensor networks
- security analysis
- energy consumption
- trusted computing
- factor authentication
- authentication protocol
- data transmission
- key management scheme
- shortest path
- mobile ad hoc networks
- secure communication
- encryption decryption
- energy efficiency
- secure manner
- medium access control
- sensor nodes
- residual energy
- sink node
- access control