An authentication scheme for locating compromised sensor nodes in WSNs.
Youtao ZhangJun YangWeijia LiLinzhang WangLingling JinPublished in: J. Netw. Comput. Appl. (2010)
Keyphrases
- authentication scheme
- sensor nodes
- wireless sensor networks
- sensor networks
- energy consumption
- key management
- smart card
- base station
- sensor data
- energy efficient
- wireless communication
- resource constrained
- user authentication
- secret key
- data transmission
- energy efficiency
- data aggregation
- public key
- resource limitations
- routing algorithm
- network lifetime
- environmental monitoring
- mobile sensor networks
- authentication protocol
- battery powered
- routing protocol
- energy aware
- security analysis
- lightweight
- sink node
- multi hop
- data streams
- body sensor networks
- data center
- node selection