A security protocol for sensor networks.
Khadija Jirari StewartThemistoklis HaniotakisSpyros TragoudasPublished in: GLOBECOM (2005)
Keyphrases
- sensor networks
- security protocols
- resource constrained
- key management
- security mechanisms
- wireless sensor networks
- security services
- data collection
- sensor data
- security properties
- sensor nodes
- environmental monitoring
- data streams
- communication cost
- energy efficient
- underwater acoustic
- energy consumption
- authentication protocol
- base station
- data aggregation
- sensor web
- communication bandwidth
- visual sensor networks
- heterogeneous sensor networks
- rfid tags
- data distribution
- routing protocol