Secret-Sharing Approach for Detecting Compromised Mobile Sink in Unattended Wireless Sensor Networks.
Xiangyi ChenLiangmin WangPublished in: MSN (2017)
Keyphrases
- sensor nodes
- wireless sensor networks
- secret sharing
- secret sharing scheme
- key management
- sensor networks
- resource constrained
- base station
- data transmission
- visual cryptography scheme
- mobile networks
- energy consumption
- multi party
- mobile nodes
- residual energy
- sink node
- multi hop
- routing algorithm
- mobile devices
- sensor data
- routing protocol
- visual cryptography
- video sequences
- encryption scheme
- secret image