Login / Signup
Location Verification Based Defense Against Sybil Attack in Sensor Networks.
Debapriyay Mukhopadhyay
Indranil Saha
Published in:
ICDCN (2006)
Keyphrases
</>
sensor networks
wireless sensor networks
resource constrained
malicious users
sensor data
sensor nodes
data collection
energy consumption
underwater acoustic
environmental monitoring
ddos attacks
defense mechanisms
communication bandwidth
communication cost
energy efficient
data aggregation
energy efficiency
sensor readings
malicious nodes
data gathering
base station
network security
mobile wireless
data streams
real time
location information
routing protocol
mobile sensor networks
data sets
sensor web