Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks.
Yingying ChenJie YangWade TrappeRichard P. MartinPublished in: IEEE Trans. Veh. Technol. (2010)
Keyphrases
- sensor networks
- network connectivity
- visual sensor networks
- wireless video
- mobile wireless
- wireless sensor networks
- resource constrained
- data gathering
- wireless communication
- energy efficient
- sensor nodes
- environmental monitoring
- wireless sensor
- mobile nodes
- low complexity
- key management
- wireless networks
- underwater acoustic
- sensor data
- communication cost
- energy consumption
- data streams
- sensor web
- multi hop
- mobile devices
- security protocols
- data aggregation
- mobile ad hoc networks
- routing protocol
- mobile sensor networks
- encryption scheme
- cellular networks
- signature scheme
- image processing algorithms
- data transmission