Swarm-based defense technique for tampering and cheating attack in WSN using CPHS.
S. PeriyanayagiV. SumathyPublished in: Pers. Ubiquitous Comput. (2018)
Keyphrases
- ddos attacks
- forensic analysis
- defense mechanisms
- wireless sensor networks
- malicious attacks
- digital images
- network security
- reverse engineering
- energy efficient
- detecting malicious
- dos attacks
- particle swarm optimization
- countermeasures
- data aggregation
- swarm intelligence
- intrusion detection
- cooperative
- collective behavior
- search space
- sensor networks
- watermarking scheme
- resource constrained
- routing protocol
- energy consumption
- copyright protection
- digital forensics
- authentication scheme
- denial of service attacks
- sensor nodes
- information security