Constrained Function-Based Message Authentication for Sensor Networks.
Chia-Mu YuYao-Tung TsouChun-Shien LuSy-Yen KuoPublished in: IEEE Trans. Inf. Forensics Secur. (2011)
Keyphrases
- sensor networks
- wireless sensor networks
- sensor nodes
- sensor data
- environmental monitoring
- data streams
- data collection
- communication cost
- resource constrained
- underwater acoustic
- data aggregation
- energy efficient
- sensor readings
- communication bandwidth
- visual sensor networks
- mobile sensor networks
- data gathering
- base station
- network connectivity
- sensor web
- data dissemination
- security mechanisms
- sensing devices
- pairwise
- real time