Protecting from Inside Attacks in Wireless Sensor Networks.
Xu HuangMuhammad AhmedDharmendra SharmaPublished in: DASC (2011)
Keyphrases
- wireless sensor networks
- secure routing
- malicious nodes
- sensor networks
- protection mechanisms
- energy efficient
- countermeasures
- data aggregation
- sensor nodes
- energy consumption
- biological inspired
- environmental monitoring
- watermarking scheme
- multi hop
- resource constrained
- base station
- routing protocol
- security threats
- data transmission
- energy aware
- energy efficiency
- denial of service attacks
- key management
- privacy preservation
- watermarking algorithm
- routing algorithm
- data gathering
- ddos attacks
- security mechanisms
- terrorist attacks
- unauthorized access
- watermarking technique
- routing scheme
- malicious users
- security risks
- sensitive data
- end to end