Authentication in wireless sensor networks and applications.
Vijaya Kumar MurthyN. VolkovsM. SethumadhvanPublished in: ACWR (2011)
Keyphrases
- wireless sensor networks
- sensor networks
- energy efficient
- energy consumption
- sensor nodes
- data aggregation
- key management
- environmental monitoring
- key distribution
- base station
- resource constrained
- data transmission
- lightweight
- biometric authentication
- user authentication
- routing algorithm
- routing protocol
- fragile watermarking
- multi hop
- security mechanisms
- authentication scheme
- biological inspired
- wireless communication
- identity authentication
- network connectivity
- data gathering
- security analysis
- data collection
- energy efficiency
- authentication protocol
- image authentication
- topology control
- data encryption
- security systems
- low cost
- identity management
- authentication mechanism
- integrity verification
- security requirements