Two-Levels Verification for Secure Data Aggregation in Resource-Constrained Environments.
Omar Rafik Merad BoudiaHichem SedjelmaciSidi Mohammed SenouciPublished in: ICC (2018)
Keyphrases
- resource constrained
- data aggregation
- wireless sensor networks
- key management
- scheme for wireless sensor networks
- sensor networks
- security mechanisms
- sensor nodes
- energy efficient
- lightweight
- energy consumption
- resource constraints
- energy efficiency
- routing algorithm
- data transmission
- routing protocol
- sensor data
- data collection
- high security
- base station
- data streams
- rfid tags
- data sets
- multipath