On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks.
Vasileios KaryotisAnastasios KakalisSymeon PapavassiliouPublished in: SECURWARE (2009)
Keyphrases
- sensor networks
- network layer
- routing protocol
- mac layer
- cross layer
- wireless sensor networks
- physical layer
- ad hoc networks
- network topology
- mobile ad hoc networks
- energy consumption
- routing algorithm
- sensor data
- application layer
- energy efficient
- energy efficiency
- multi hop
- data transmission
- mac protocol
- sensor nodes
- resource constrained
- base station
- mobile nodes
- data streams
- video streaming
- multi layer
- wireless ad hoc networks
- wireless networks
- real time
- quality of service
- computational complexity
- network architecture