Locating Compromised Sensor Nodes Through Incremental Hashing Authentication.
Youtao ZhangJun YangLingling JinWeijia LiPublished in: DCOSS (2006)
Keyphrases
- sensor nodes
- wireless sensor networks
- sensor networks
- energy consumption
- base station
- resource constrained
- sensor data
- data transmission
- mobile sensor networks
- security mechanisms
- energy efficient
- wireless communication
- wireless multimedia sensor networks
- routing protocol
- data aggregation
- resource limitations
- data collection
- energy efficiency
- sensed data
- routing algorithm
- battery powered
- multi hop
- sink node
- security analysis
- cluster head
- authentication protocol
- environmental monitoring
- node selection
- wireless sensor nodes
- mobile users
- network connectivity
- smart home
- ad hoc networks
- wireless networks
- body sensor networks