Login / Signup
Chaotic communication improves authentication: protecting WSNs against injection attacks.
Ivan Martinovic
Nicos Gollan
Luc Cappellaro
Jens B. Schmitt
Published in:
Secur. Commun. Networks (2009)
Keyphrases
</>
resource constrained
injection attacks
wireless sensor networks
security mechanisms
resource limitations
sensor networks
sensor nodes
routing algorithm
information systems
access control
energy consumption
routing protocol
resource constraints
collaborative recommender systems