Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks.
Shiuh-Jeng WangYuh-Ren TsaiChung-Wei ChenPublished in: J. Commun. (2008)
Keyphrases
- sensor networks
- sensor data
- wireless sensor networks
- reduce communication cost
- resource constrained
- energy efficient
- sensor nodes
- environmental monitoring
- key establishment
- communication cost
- malicious users
- data streams
- base station
- underwater acoustic
- energy consumption
- data aggregation
- sensor readings
- visual sensor networks
- mobile wireless
- pairwise
- data dissemination
- security mechanisms
- communication bandwidth
- mobile nodes
- energy efficiency
- data transmission