Defense against outside attacks in wireless sensor networks.
Somanath TripathySukumar NandiPublished in: Comput. Commun. (2008)
Keyphrases
- wireless sensor networks
- ddos attacks
- defense mechanisms
- secure routing
- energy efficient
- malicious nodes
- sensor networks
- data aggregation
- sensor nodes
- base station
- biological inspired
- computer virus
- countermeasures
- resource constrained
- energy consumption
- security mechanisms
- denial of service attacks
- intrusion detection
- routing algorithm
- data gathering
- environmental monitoring
- malicious users
- topology control
- malicious attacks
- chosen plaintext
- routing scheme
- multi hop
- data transmission
- watermarking scheme
- network security
- routing protocol
- dos attacks
- energy aware
- key management
- advanced research projects agency
- cryptographic protocols
- security threats
- traffic analysis
- security protocols
- computer security
- energy efficiency
- wireless communication