Sensor Network Connectivity and Security Analysis Using a Single Per-node Random Key.
Jason BarbourMohamed F. YounisPublished in: LCN (2007)
Keyphrases
- sensor networks
- security analysis
- high security
- network connectivity
- wireless sensor networks
- sensor data
- resource constrained
- private key
- energy consumption
- data collection
- smart card
- public key
- sensor nodes
- mobile nodes
- base station
- security requirements
- key establishment
- sink node
- mobile sensor networks
- sensing devices
- real time
- data streams
- authentication protocol
- directed graph
- encryption algorithm
- symmetric key
- routing protocol
- software engineering