A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream
The near real-time processing of continuous data flows in large scale sensor networks has many applications in risk-critical domains ranging from emergency management to industrial control systems. The problem is how to ensure end-to-end security (e.g., integrity, and authenticity) of such data stream for risk-critical applications. We refer this as an online security verification problem. Existing security techniques cannot deal with this problem because they were not designed to deal with...[Show more]
|Collections||ANU Research Publications|
|Source:||Lecture Notes in Computer Science 9419|
|01_Puthal_A_Dynamic_Key_Length_Based_2015.pdf||1.1 MB||Adobe PDF||Request a copy|
|02_Puthal_A_Dynamic_Key_Length_Based_2015.pdf||45.99 kB||Adobe PDF||Request a copy|
Items in Open Research are protected by copyright, with all rights reserved, unless otherwise indicated.