Rappaport / Wollongong / Washington / DC / Secure Reference / Florence / /
Company
SIA / Wireless Sensor Networks / Australian Computer Society Inc. / Texas Instruments / /
Country
Italy / United States / Australia / / /
IndustryTerm
energy lifetime / secure data aggregation protocols / consumed energy / wireless network / energy impact / large networks / secure hop-by-hop data aggregation protocol / reference-based data aggregation protocol / verification protocol / cryptographic algorithm / distributed networks / lightweight wireless nodes / wireless networks / energy / real-time target tracking usingwireless sensor networks / energy consumption / sensor networks / minimum security services / energy cost / cryptographic algorithms / security services / tamper-resistant hardware / secure sensor networks / Wireless_pdf/MICA2_Datasheet.pdf / wireless environment / secure hop-byhop data aggregation protocol / security protocols / wireless communication / ad-hoc network / security solutions / /
OperatingSystem
TinyOS / DoS / /
Organization
pp. / survey Hani Alzaid Ernest Foo Juan Gonzalez Nieto Information Security Institute Qeensland University of Technology / Australian Computer Society / IEEE Computer Society / /
Person
Ljiljana Brankovic / Wen / V / Ernest Foo Juan Gonzalez Nieto / Mirka Miller / Sybil Attack / Hani Alzaid Ernest Foo Juan / /
Position
cluster-head / scheme designer / Cao / forward / /
ProgrammingLanguage
R / Hoc / DC / /
PublishedMedium
Lecture Notes in Computer Science / /
Technology
Information Technology / SNEP protocol / secure hop-by-hop data aggregation protocol / ESA / tication Interactive protocol / security protocols / machine learning / Secure reference-based data aggregation protocol / pdf / cryptographic algorithm / encryption / secure hop-byhop data aggregation protocol / secure data aggregation protocols / IEEE Real Time Technology / public key / Mobile Computing / verification protocol / http / embedded processors / Digital signature / flash / proposed protocol / using a cryptographic algorithm / /