Authentication of the Message through Hop-by-Hop and Secure the Source Nodes in Wireless Sensor Networks.
B. Anil KumarN. Bhaskara RaoM. S. SunithaPublished in: FICTA (2) (2014)
Keyphrases
- destination node
- wireless sensor networks
- sensor nodes
- key establishment
- security analysis
- sensor networks
- source node
- key management
- message authentication codes
- public key
- energy efficient
- secure routing
- authentication mechanism
- topology control
- wireless mesh networks
- user authentication
- authentication protocol
- security requirements
- routing protocol
- authentication scheme
- key distribution
- integrity verification
- ad hoc networks
- security mechanisms
- base station
- sink node
- routing table
- data encryption
- energy consumption
- identity management
- resource constrained
- node selection
- network connectivity
- shortest path
- smart card
- factor authentication
- password authentication
- multi hop