Searchable Encryption for Integrating Cloud and Sensor Networks with Secure Updates.
Selasi Kwame OcanseyChangda WangPublished in: Ad Hoc Sens. Wirel. Networks (2021)
Keyphrases
- sensor networks
- key management
- wireless sensor networks
- resource constrained
- key establishment
- encryption scheme
- energy consumption
- security properties
- digital signature
- cloud computing
- environmental monitoring
- sensor nodes
- security analysis
- cryptographic protocols
- communication cost
- energy efficient
- underwater acoustic
- public key cryptography
- base station
- sensor data
- key distribution
- symmetric key
- data streams
- data aggregation
- sensor readings
- data protection
- data dissemination
- digital libraries
- routing protocol
- security protocols
- security mechanisms
- secret key
- energy efficiency
- standard model
- communication bandwidth
- ad hoc networks
- diffie hellman
- secure communication
- security issues
- security requirements
- key management scheme
- visual sensor networks
- provably secure
- routing algorithm
- data gathering
- pairwise
- mobile sensor networks