Performance Analysis of Denial-of-Sleep Attack-Prone MAC Protocols in Wireless Sensor Networks.
Ekereuke UdohVladimir GetovPublished in: UKSim (2018)
Keyphrases
- wireless sensor networks
- medium access
- key establishment
- authentication protocol
- multi hop
- data transmission
- malicious nodes
- sensor networks
- energy consumption
- energy efficient
- base station
- secret key
- data aggregation
- sensor nodes
- resource constrained
- routing algorithm
- countermeasures
- environmental monitoring
- biological inspired
- obstructive sleep apnea
- routing protocol
- wireless communication
- energy efficiency
- public key
- key management
- data gathering
- sleep stage
- body sensor networks
- end to end
- topology control
- cryptographic protocols
- encryption algorithm
- mobile nodes