Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data Processing.
David JostMathias FischerPublished in: ICISSP (2020)
Keyphrases
- data processing
- data integrity
- security architecture
- malicious nodes
- network nodes
- data storage
- wireless sensor networks
- database design
- distributed databases
- data management
- data analysis
- computer networks
- database systems
- client server
- information security
- communication networks
- network structure
- computer systems
- active databases
- application level
- peer to peer