Secure decentralized data transfer against node capture attacks for wireless sensor networks.
Eitaro KohnoTomoyuki OhtaYoshiaki KakudaPublished in: ISADS (2009)
Keyphrases
- data transfer
- wireless sensor networks
- data transmission
- secure routing
- malicious nodes
- residual energy
- key management scheme
- routing protocol
- key management
- energy consumption
- data delivery
- biological inspired
- base station
- sensor nodes
- security protocols
- data access
- sink node
- security mechanisms
- sensor networks
- ad hoc networks
- resource constrained
- data flow
- multi hop
- mobile nodes
- stream cipher
- routing algorithm
- file system
- data collection
- distributed systems
- cryptographic protocols
- key distribution
- network nodes
- mobile ad hoc networks
- real time