Exploring Cryptographic Techniques for Data security in Resource-Constrained Wireless Sensor Networks:Performance Evaluation and Considerations.
Dharshika SingarathnamSwathi GanesanSangita PokhrelNalinda Prasad SomasiriPublished in: ICSECS (2023)
Keyphrases
- resource constrained
- data security
- wireless sensor networks
- key management
- data centric
- encryption decryption
- access control
- sensor networks
- sensor nodes
- data management
- energy consumption
- resource limitations
- data integrity
- routing protocol
- lightweight
- data privacy
- information security
- smart card
- data collection
- distributed databases
- routing algorithm
- data sets
- privacy preserving data mining
- resource constraints
- hash functions
- third party
- power consumption