Modelling adversaries and security objectives for routing protocols in wireless sensor networks.
Gergely ÁcsLevente ButtyánIstván VajdaPublished in: SASN (2006)
Keyphrases
- routing protocol
- wireless sensor networks
- secure routing
- key management
- ad hoc networks
- network layer
- routing algorithm
- energy efficient
- energy consumption
- mobile ad hoc networks
- network topology
- energy aware
- key management scheme
- biological inspired
- data transmission
- ns simulator
- multi hop
- sensor networks
- sensor nodes
- energy efficiency
- routing scheme
- data delivery
- network lifetime
- base station
- malicious nodes
- network security
- resource constrained
- ad hoc networking
- mobile nodes
- end to end delay
- security policies
- wireless communication
- security protocols
- security issues
- neighboring nodes
- cross layer
- wireless ad hoc networks
- packet delivery
- aodv routing protocol
- intrusion detection