Security Domain for the Sensor Nodes with Strong Authentication.
Janusz FurtakZbigniew ZielinskiJan ChudzikiewiczPublished in: ICMCIS (2019)
Keyphrases
- sensor nodes
- wireless sensor networks
- resource constrained
- security mechanisms
- sensor networks
- energy consumption
- key establishment
- key management
- base station
- resource limitations
- data transmission
- security requirements
- sensor data
- energy efficient
- wireless communication
- security services
- mobile sensor networks
- energy efficiency
- security analysis
- wireless sensor nodes
- authentication protocol
- routing protocol
- symmetric key
- wireless multimedia sensor networks
- data aggregation
- data collection
- user authentication
- key distribution
- resource constraints
- routing algorithm
- sensed data
- data streams
- security issues
- private key
- environmental monitoring
- access control
- smart card
- multi hop