Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation ; Print ISSN: 1536-1233.
We present an approach that 1) conceals sensed data end-to-end by 2) still providing efficient and flexible in-network data aggregation. The aggregating ...
We present an approach that 1) conceals sensed data end-to-end by 2) still providing efficient and flexible in-network data aggregation. The aggregating ...
People also ask
Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation.
(2006) Concealed Data Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation. IEEE Transactions ...
Abstract— End-to-end encryption for wireless sensor networks is a challenging problem. To save the overall energy resources of the network it is agreed that ...
We present an approach that (1) conceals sensed data end-to-end, by (2) still providing efficient in-network data aggregation. The aggregating intermediate ...
In this paper, we propose an asymmetric key encryption scheme based on elliptic curve to provide a solution for WSNs. Firstly, the scheme optimizes the key ...
Jul 3, 2006 · The Concealed Data Aggregation (CDA)3) approach proposes to use symmetric additively homomorphic encryption transformations for end-to-end ...
Acharya, (2006) “Concealed Data. Aggregation for Reverse Multicast Traffic in Sensor Networks: Encryption, Key Distribution, and Routing Adaptation,” IEEE Trans ...