Mobility

Encryption and Signature Scheme Implementation for Data Integrity Using Recoverable Concealed Data Aggregation

Download Now Free registration required

Executive Summary

Wireless sensor networks have been widely deployed in many applications, e.g., military field surveillance, health care, environment monitor, accident report, etc. Each sensor detects a target within its radio range, performs simple computations, and communicates with other sensors. Generally, sensors are constrained in battery power, communication, and computation capability; therefore, reducing the power consumption is a critical concern for a WSN. Unfortunately, an adversary has the ability to capture cluster heads. It would cause the compromise of the whole cluster; these schemes restrict the data type of aggregation or cause extra transmission overhead.

  • Format: PDF
  • Size: 117 KB