Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks.
Alexander BecherZinaida BenensonMaximillian DornseifPublished in: SPC (2006)
Keyphrases
- wireless sensor networks
- real world
- sensor nodes
- watermarking scheme
- sensor networks
- energy efficient
- energy consumption
- resource constrained
- digital images
- routing protocol
- wireless communication
- base station
- malicious attacks
- data aggregation
- malicious nodes
- multi hop
- wireless sensor
- countermeasures
- energy efficiency
- data transmission
- data mining
- detecting malicious
- energy saving
- data sets
- reverse engineering
- routing algorithm
- case study
- key management
- fault tolerance
- robust watermarking scheme
- watermarking method
- secure routing