Research on Security Location of Malicious Node Filtering for Environmental Monitoring Sensor Networks.
Chaoyang WangMingliang LiXuewen LiuXuejiao WuPublished in: ICSIM (2020)
Keyphrases
- environmental monitoring
- sensor networks
- malicious nodes
- wireless sensor networks
- sensor nodes
- energy efficient
- energy consumption
- key establishment
- data aggregation
- sensor data
- sensor readings
- base station
- resource constrained
- key pre distribution scheme
- key pre distribution
- key management
- location information
- wireless sensor
- data transmission
- heterogeneous sensor networks
- energy efficiency
- mobile nodes
- routing protocol
- multi hop
- underwater acoustic
- routing algorithm
- visual sensor networks
- data streams
- wireless communication
- information security
- access control
- data gathering
- sink node
- security issues
- key management scheme
- mobile sensor networks
- data sets
- topology control
- communication cost
- security analysis
- cluster head
- communication bandwidth
- wireless sensor nodes