Secure countermeasures to data aggregation attacks on sensor networks.
Saharnaz ZareAfifiRomil VermaBrian KingPaul SalamaDongsoo S. KimPublished in: MWSCAS (2012)
Keyphrases
- countermeasures
- data aggregation
- sensor networks
- security measures
- wireless sensor networks
- information security
- key establishment
- security issues
- sensor nodes
- energy efficient
- sensor data
- resource constrained
- security mechanisms
- key management
- security requirements
- data dissemination
- data streams
- power analysis
- sql injection
- data collection
- java card
- energy consumption
- energy efficiency
- base station
- lightweight
- sensitive data
- smart card
- routing algorithm
- cluster head
- encryption scheme
- similarity search
- multi hop
- network topology
- sink node
- stream cipher
- information systems