A constrained function based message authentication scheme for sensor networks.
Chia-Mu YuChun-Shien LuSy-Yen KuoPublished in: WCNC (2009)
Keyphrases
- sensor networks
- authentication scheme
- wireless sensor networks
- environmental monitoring
- sensor data
- communication cost
- smart card
- resource constrained
- energy consumption
- sensor nodes
- data streams
- user authentication
- underwater acoustic
- energy efficient
- key management
- sensor web
- communication bandwidth
- data aggregation
- security analysis
- real time
- visual sensor networks
- secret key
- public key
- data sharing
- mobile sensor networks
- routing protocol