Secure Data Aggregation with MAC Authentication in Wireless Sensor Networks.
Soufiene Ben OthmanAbdelbasset TradHabib YoussefHani AlzaidPublished in: TrustCom/ISPA/IUCC (2013)
Keyphrases
- data aggregation
- wireless sensor networks
- key management
- key distribution
- security mechanisms
- authentication mechanism
- resource constrained
- authentication scheme
- user authentication
- scheme for wireless sensor networks
- password authentication
- data encryption
- factor authentication
- energy efficient
- authentication protocol
- identity management
- sensor networks
- security analysis
- integrity verification
- secure manner
- security requirements
- energy consumption
- sensor nodes
- data collection
- base station
- smart card
- security issues
- data transmission
- rights management
- routing protocol
- energy efficiency
- security protocols
- private key
- data dissemination
- access control
- multi hop
- routing algorithm
- public key cryptography
- diffie hellman
- sink node
- data acquisition
- public key