A symmetric cryptographic construct for securing wireless sensor network communications.
A. A. AdekunlePublished in: IWCMC (2015)
Keyphrases
- wireless sensor networks
- key management
- resource constrained
- smart card
- energy consumption
- information security
- communication systems
- resource limitations
- network management
- communication patterns
- hash functions
- routing algorithm
- sensor nodes
- sensor networks
- environmental monitoring
- random number generator
- database
- energy efficient
- energy efficiency
- communication networks
- case study