Computer Science ›› 2007, Vol. 34 ›› Issue (6): 84-87.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: Security threat can happen in a wireless sensor network not only while relaying information to the end-user but also while generating information. So, the conventional view of security based on cryptography and authentication alone is not sufficient for t

Key words: Wireless sensor networks, Data authentication, Reputation, Beta distribution

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!