Download now Free registration required
Today most of the applications such as military operations, medical systems, aerospace systems, robotic systems, process control, factory automation, building and environmental control and smart spaces need the integration of the sensor-based systems; hence there is a need to provide security for these sensor-based applications for the healthy operations. It is very important to provide authentic and accurate data to surrounding sensor nodes. For this every node should be able to verify the authenticity and integrity of the incoming packets using the predicted value of the key generated based on the energy of the node in-order to reduce the energy consumption of the sensor nodes during the transmission.
- Format: PDF
- Size: 1134.1 KB