Login / Signup
An authentication scheme for filtering injected bogus data in sensor networks.
Yong Ho Kim
Dong Hoon Lee
Published in:
Comput. Commun. (2008)
Keyphrases
</>
sensor networks
data collection
sensor data
environmental monitoring
data sets
communication bandwidth
authentication scheme
resource constrained
wireless sensor networks
data points
data gathering
information systems
sensor readings
data analysis
data sources
computer systems