Containing bogus packet insertion attacks for broadcast authentication in sensor networks.
Kaiqi XiongRonghua WangWenliang DuPeng NingPublished in: ACM Trans. Sens. Networks (2012)
Keyphrases
- sensor networks
- security mechanisms
- resource constrained
- data dissemination
- stepping stones
- wireless sensor networks
- sensor nodes
- digital watermarking
- energy efficient
- sensor data
- environmental monitoring
- security protocols
- energy consumption
- data streams
- data aggregation
- underwater acoustic
- authentication protocol
- information dissemination
- visual sensor networks
- packet loss
- energy efficiency
- communication cost
- routing protocol
- communication bandwidth
- mobile wireless
- access control
- security requirements
- security analysis
- security issues
- base station
- sensor web
- mobile sensor networks
- data sets
- intrusion detection
- mobile nodes