|
Volumn 2, Issue , 2009, Pages 333-335
|
Simulation of key management protocol in wireless sensor networks
|
Author keywords
[No Author keywords available]
|
Indexed keywords
BASIC RESEARCH;
HOSTILE ENVIRONMENTS;
INTRINSIC PROPERTY;
KEY MANAGEMENT;
KEY MANAGEMENT PROTOCOLS;
LARGE-SCALE SENSORS;
MILITARY FIELDS;
NETWORK SETTINGS;
SECURE WIRELESS SENSOR NETWORKS;
SIMULATION RESULT;
COMBINED SEWERS;
COMPUTER SIMULATION;
LEACHING;
NETWORK MANAGEMENT;
NETWORK PROTOCOLS;
NETWORK SECURITY;
PUBLIC KEY CRYPTOGRAPHY;
ROUTING PROTOCOLS;
SENSOR NETWORKS;
SENSOR NODES;
TELECOMMUNICATION EQUIPMENT;
WIRELESS TELECOMMUNICATION SYSTEMS;
WIRELESS SENSOR NETWORKS;
|
EID: 70449412672
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/CSO.2009.332 Document Type: Conference Paper |
Times cited : (3)
|
References (8)
|