Secure sensor networks for perimeter protection.
Sasikanth AvanchaJeffrey UndercofferAnupam JoshiJohn PinkstonPublished in: Comput. Networks (2003)
Keyphrases
- sensor networks
- key establishment
- wireless sensor networks
- data protection
- data collection
- information security
- sensor nodes
- environmental monitoring
- energy consumption
- security issues
- sensor data
- underwater acoustic
- energy efficient
- data streams
- communication bandwidth
- sensor readings
- security requirements
- sensitive data
- resource constrained
- key management
- data aggregation
- data gathering
- key management scheme
- data sets
- privacy protection
- mobile wireless
- data transmission
- security mechanisms
- energy efficiency
- base station
- secure communication
- key technologies
- routing protocol
- data dissemination