Detecting Wormhole Attacks in Wireless Sensor Networks.
Yurong XuGuanling ChenJames FordFillia MakedonPublished in: Critical Infrastructure Protection (2007)
Keyphrases
- wireless sensor networks
- sensor networks
- network intrusion detection systems
- detect malicious
- energy consumption
- energy efficient
- sensor nodes
- secure routing
- routing algorithm
- malicious activities
- data aggregation
- multi hop
- biological inspired
- detecting malicious
- malicious nodes
- mobile ad hoc networks
- data transmission
- countermeasures
- routing protocol
- wireless communication
- energy efficiency
- resource constrained
- base station
- data gathering
- environmental monitoring
- malicious attacks
- terrorist attacks
- intrusion detection
- watermarking scheme
- chosen plaintext
- ad hoc networks
- network security
- misuse detection
- malicious users
- multipath
- topology control
- traffic analysis