2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies 2009
DOI: 10.1109/ngmast.2009.78
|View full text |Cite
|
Sign up to set email alerts
|

On Efficient Data Integrity and Data Origin Authentication for Wireless Sensor Networks Utilising Block Cipher Design Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…e rapid development of big data technology has penetrated deeply into people's lives. Big data technologies such as government affairs big data [1], big judicial data [2], and extensive medical data [3] are gradually providing robust data technical support for the progress of the society. However, big data has characteristics different from traditional data and needs to be processed using technologies suitable for big data.…”
Section: Introductionmentioning
confidence: 99%
“…e rapid development of big data technology has penetrated deeply into people's lives. Big data technologies such as government affairs big data [1], big judicial data [2], and extensive medical data [3] are gradually providing robust data technical support for the progress of the society. However, big data has characteristics different from traditional data and needs to be processed using technologies suitable for big data.…”
Section: Introductionmentioning
confidence: 99%
“…Data authentication is the process ensuring that the provider is truly the provider of the data [17,18]. The provider should be authenticated so that the attacker pretending to be the sender would not be able to fake the communication.…”
Section: Data Management In Ami Environmentsmentioning
confidence: 99%
“…Data confidentiality is the process of hiding the information so that only the recipients could know of what's being provided by the provider. It can be achieved by using the data encryption algorithms defined in symmetric [16,18] (shared common key) and asymmetric (public-private key pairs) models.…”
Section: Data Management In Ami Environmentsmentioning
confidence: 99%