: Characterizing Malware Propagation in WSNs With Second Immunization.
Xiaotong YeSisi XieShigen ShenPublished in: IEEE Access (2021)
Keyphrases
- wireless sensor networks
- energy efficient
- energy consumption
- sensor networks
- wave propagation
- sensor nodes
- energy aware
- reverse engineering
- resource constrained
- data collection
- resource limitations
- secure routing
- malware detection
- data aggregation
- scheme for wireless sensor networks
- neural network
- environmental monitoring
- energy saving
- control flow
- mac protocol
- routing protocol
- software engineering
- data gathering
- key management
- data transmission
- base station
- source code