Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation ; Print ISSN: 1536-1233.
We present an approach that 1) conceals sensed data end-to-end by 2) still providing efficient and flexible in-network data aggregation. The aggregating ...
We present an approach that 1) conceals sensed data end-to-end by 2) still providing efficient and flexible in-network data aggregation. The aggregating ...
People also ask
What is data aggregation in sensor networks?
What are the metrics used for data aggregation in WSN?
What is clustering routing in wireless sensor networks?
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation.
(2006) Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation. IEEE Transactions ...
Abstract— End-to-end encryption for wireless sensor networks is a challenging problem. To save the overall energy resources of the network it is agreed that ...
We present an approach that (1) conceals sensed data end-to-end, by (2) still providing efficient in-network data aggregation. The aggregating intermediate ...
In this paper, we propose an asymmetric key encryption scheme based on elliptic curve to provide a solution for WSNs. Firstly, the scheme optimizes the key ...
Jul 3, 2006 · The Concealed Data Aggregation (CDA)3) approach proposes to use symmetric additively homomorphic encryption transformations for end-to-end ...
Acharya, (2006) “Concealed Data. Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation,” IEEE Trans ...