An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
Sencun ZhuSanjeev SetiaSushil JajodiaPeng NingPublished in: IEEE Symposium on Security and Privacy (2004)
Keyphrases
- sensor networks
- sensor data
- data collection
- data sets
- data analysis
- communication bandwidth
- environmental monitoring
- data gathering
- authentication scheme
- wireless sensor networks
- energy consumption
- sensor readings
- high dimensional data
- network connectivity
- query processing
- software architecture
- energy efficient
- resource constrained
- information systems
- real time