Location Verification Based Defense Against Sybil Attack in Sensor Networks.
Debapriyay MukhopadhyayIndranil SahaPublished in: ICDCN (2006)
Keyphrases
- sensor networks
- wireless sensor networks
- resource constrained
- malicious users
- sensor data
- sensor nodes
- data collection
- energy consumption
- underwater acoustic
- environmental monitoring
- ddos attacks
- defense mechanisms
- communication bandwidth
- communication cost
- energy efficient
- data aggregation
- energy efficiency
- sensor readings
- malicious nodes
- data gathering
- base station
- network security
- mobile wireless
- data streams
- real time
- location information
- routing protocol
- mobile sensor networks
- data sets
- sensor web