An application-driven approach to designing secure wireless sensor networks.
Eric SabbahKyoung-Don KangNael B. Abu-GhazalehAdnan MajeedKe LiuPublished in: Wirel. Commun. Mob. Comput. (2008)
Keyphrases
- wireless sensor networks
- key management
- key management scheme
- key establishment
- energy efficient
- secure routing
- sensor networks
- lightweight
- energy consumption
- environmental monitoring
- resource constrained
- routing algorithm
- base station
- node selection
- multi hop
- sensor nodes
- security mechanisms
- data driven
- topology control
- security analysis
- data gathering
- cryptographic protocols
- routing protocol
- key distribution
- security protocols
- data aggregation
- ad hoc networks
- wireless sensor
- secure communication
- sensitive data
- peer to peer
- neural network