Securing wireless sensor networks against aggregator compromises

T Claveirole, MD De Amorim… - IEEE …, 2008 - ieeexplore.ieee.org
A common approach to overcome the limited nature of sensor networks is to aggregate data
at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security …

[引用][C] Securing Wireless Sensor Networks Agaunst Aggregator Compromises

T CLAVEIROLE - IEEE Commun. Mag., 2008 - cir.nii.ac.jp
Securing Wireless Sensor Networks Agaunst Aggregator Compromises | CiNii Research CiNii
国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 論文・データを …

[PDF][PDF] Securing wireless sensor networks against aggregator compromises

T Claveirole, MD de Amorim, M Abdalla, Y Viniotis - researchgate.net
A common approach to overcome the limited nature of sensor networks is to aggregate data
at intermediate nodes. A challenging issue in this context is to guarantee end-toend security …

Securing wireless sensor networks against aggregator compromises

T Claveirole, MD de Amorim, M Abdalla… - IEEE Communications …, 2008 - infona.pl
A common approach to overcome the limited nature of sensor networks is to aggregate data
at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security …

Securing Wireless Sensor Networks Against Aggregator Compromises

T Claveirole, MD de Amorim, M Abdalla… - IEEE Communications …, 2008 - hal.science
common approach to overcome the limited nature of sensor networks is to aggregate data at
intermediate nodes. A challenging issue in this context is to guarantee end-to-end security …

Securing wireless sensor networks against aggregator compromises

T Claveirole, MD de Amorim, M Abdalla… - IEEE Communications …, 2008 - dl.acm.org
A common approach to overcome the limited nature of sensor networks is to aggregate data
at intermediate nodes. A challenging issue in this context is to guarantee end-to-end security …

Securing Wireless Sensor Networks Against Aggregator Compromises

T Claveirole, MD de Amorim… - IEEE …, 2008 - hal.sorbonne-universite.fr
common approach to overcome the limited nature of sensor networks is to aggregate data at
intermediate nodes. A challenging issue in this context is to guarantee end-to-end security …

[PDF][PDF] Securing wireless sensor networks against aggregator compromises

T Claveirole, MD de Amorim, M Abdalla, Y Viniotis - researchgate.net
A common approach to overcome the limited nature of sensor networks is to aggregate data
at intermediate nodes. A challenging issue in this context is to guarantee end-toend security …

Securing Wireless Sensor Networks Against Aggregator Compromises

T Claveirole, MD de Amorim… - IEEE …, 2008 - hal.sorbonne-universite.fr
common approach to overcome the limited nature of sensor networks is to aggregate data at
intermediate nodes. A challenging issue in this context is to guarantee end-to-end security …