Long and Strong Security using Reputation and ECC for Cloud Assisted Wireless Sensor Networks.
D. Antony Joseph RajanE. R. NaganathanPublished in: Scalable Comput. Pract. Exp. (2020)
Keyphrases
- wireless sensor networks
- malicious nodes
- key management
- elliptic curve cryptography
- security analysis
- wireless sensor
- elliptic curve
- public key cryptosystems
- key establishment
- trust management
- cloud computing
- cloud storage
- routing algorithm
- energy efficient
- high security
- key management scheme
- security issues
- sensor networks
- access control
- error correction
- information security
- data aggregation
- energy consumption
- sensor nodes
- energy efficiency
- intrusion detection
- base station
- network security
- statistical databases
- cloud computing environment
- public key cryptography
- resource constrained
- computing infrastructure
- data center
- routing protocol
- wireless sensor nodes
- authentication scheme
- trust relationships
- cloud services
- trust model
- multi hop
- security requirements
- security policies
- network management
- security services
- security mechanisms
- encryption scheme