Skip navigation
Skip navigation

A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream

Puthal, Deepak; Nepal, Surya; Ranjan, Rajiv; Chen, Jinjun


The near real-time processing of continuous data flows in large scale sensor networks has many applications in risk-critical domains ranging from emergency management to industrial control systems. The problem is how to ensure end-to-end security (e.g., integrity, and authenticity) of such data stream for risk-critical applications. We refer this as an online security verification problem. Existing security techniques cannot deal with this problem because they were not designed to deal with...[Show more]

CollectionsANU Research Publications
Date published: 2015
Type: Conference paper
Source: Lecture Notes in Computer Science 9419
DOI: 10.1007/978-3-319-26187-4_7


File Description SizeFormat Image
01_Puthal_A_Dynamic_Key_Length_Based_2015.pdf1.1 MBAdobe PDF    Request a copy
02_Puthal_A_Dynamic_Key_Length_Based_2015.pdf45.99 kBAdobe PDF    Request a copy

Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.

Updated:  19 May 2020/ Responsible Officer:  University Librarian/ Page Contact:  Library Systems & Web Coordinator