Security Considerations and Key Negotiation Techniques for Power Constrained Sensor Networks.
Barry DoyleStuart BellAlan F. SmeatonKealan McCuskerNoel E. O'ConnorPublished in: Comput. J. (2006)
Keyphrases
- sensor networks
- key pre distribution
- wireless sensor networks
- key establishment
- sensor nodes
- key distribution
- sensor data
- resource constrained
- wireless sensor
- underwater acoustic
- data collection
- communication cost
- data streams
- base station
- environmental monitoring
- energy efficiency
- key management
- energy efficient
- power consumption
- data aggregation
- heterogeneous sensor networks
- data dissemination
- information security
- mobile sensor networks
- wireless sensor nodes
- energy consumption
- sensor web
- security issues
- visual sensor networks
- real time
- mobile wireless
- secure communication
- network security
- routing protocol
- private key
- communication bandwidth
- sensor readings
- intrusion detection
- security requirements
- elliptic curve
- secret key