Security Provisioning as Integrity in wireless sensor networks (WSN): A Survey.
P. VenkateswariN. ShanmugasundaramPublished in: ICCCNT (2023)
Keyphrases
- wireless sensor networks
- key management
- energy efficient
- sensor networks
- key establishment
- sensor nodes
- energy consumption
- resource constrained
- key management scheme
- save energy
- wireless sensor
- data integrity
- data aggregation
- base station
- trusted computing
- data transmission
- integrity verification
- environmental monitoring
- malicious nodes
- security mechanisms
- data confidentiality
- wireless communication
- radio frequency identification rfid
- cloud computing
- energy efficiency
- data gathering
- information flow control
- information security
- wireless sensor nodes
- resource limitations
- high assurance
- routing algorithm
- network security
- data security
- access control
- network lifetime
- security policies
- security requirements
- security issues
- intrusion detection
- multi hop
- routing protocol
- resource management
- data protection
- biological inspired
- node selection
- body sensor networks
- power consumption
- elliptic curve
- sink node
- key distribution