A proactive secure routing algorithm defense against node compromise in sensor networks.
Xiangqian ChenKia MakkiKang YenNiki PissinouZhihua LiuPublished in: LCN (2008)
Keyphrases
- sensor networks
- routing algorithm
- wireless sensor networks
- key management scheme
- routing protocol
- sink node
- sensor nodes
- key management
- key establishment
- energy consumption
- cluster head
- ad hoc networks
- intermediate nodes
- mobile nodes
- topology control
- energy aware
- energy efficient
- environmental monitoring
- multipath
- data collection
- resource constrained
- sensor data
- source node
- data aggregation
- routing problem
- network coding
- network lifetime
- data transmission
- communication cost
- energy efficiency
- multi hop
- mobile ad hoc networks
- network topology
- base station
- network security
- network connectivity
- intrusion detection
- shortest path
- network resources
- security mechanisms
- wireless communication
- network traffic
- data streams
- key distribution
- wireless networks