Reuse-Attack Mitigation in Wireless Sensor Networks.
Hosein ShafieiAhmad KhonsariBaharan MirzasoleimanMohamed Ould-KhaouaPublished in: ICC (2011)
Keyphrases
- wireless sensor networks
- sensor networks
- malicious nodes
- sensor nodes
- energy efficient
- data aggregation
- base station
- energy consumption
- environmental monitoring
- resource constrained
- routing algorithm
- biological inspired
- data transmission
- countermeasures
- energy efficiency
- data gathering
- wireless communication
- learning objects
- software reuse
- energy aware
- malicious users
- multi hop
- key management
- secret key
- wireless sensor
- risk management
- malicious attacks
- key exchange protocol