Login / Signup
Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification.
Sye Loong Keoh
Zhaohui Tang
Published in:
IAS (2014)
Keyphrases
</>
end to end
integrity verification
data aggregation
wireless sensor networks
ambient intelligence
sensor networks
energy efficient
copyright protection
ad hoc networks
multipath
information hiding
base station
multi hop
energy consumption
sensor nodes
resource constrained