Sign in

A Practical Data Authentication Scheme for Unattended Wireless Sensor Networks Using Physically Unclonable Functions.

Pingchuan WangLupeng ZhangJinhao PanFengqi Li
Published in: WASA (1) (2022)
Keyphrases
  • wireless sensor networks
  • data analysis
  • authentication scheme
  • data distribution
  • sensor networks
  • data mining
  • data points
  • sensor data
  • resource constrained