Coping with Traitor Attacks in Reputation Models for Wireless Sensor Networks.
Shenlong ChenYuqing ZhangPeng LiuJingyu FengPublished in: GLOBECOM (2010)
Keyphrases
- wireless sensor networks
- reputation models
- malicious nodes
- secure routing
- energy efficient
- sensor networks
- data aggregation
- energy consumption
- environmental monitoring
- sensor nodes
- base station
- energy efficiency
- countermeasures
- routing protocol
- routing algorithm
- resource constrained
- data transmission
- data gathering
- watermarking scheme
- malicious users
- wireless communication
- biological inspired
- watermarking algorithm
- malicious attacks
- multi hop
- security risks
- security threats
- security protocols
- key management
- denial of service attacks
- network security
- ad hoc networks
- intrusion detection
- body sensor networks