WiSec 2011 demo: demonstrating self-contained on-node counter measures for various jamming attacks in WSN.
Steffen OrtmannPeter LangendörferStephan KornemannPublished in: ACM SIGMOBILE Mob. Comput. Commun. Rev. (2011)
Keyphrases
- countermeasures
- wireless sensor networks
- information security
- node selection
- topology control
- energy efficient
- security measures
- cyber attacks
- data aggregation
- routing protocol
- residual energy
- power analysis
- cluster head
- resource constrained
- energy consumption
- sink node
- resource limitations
- sensor nodes
- information systems
- graph structure
- malicious nodes
- multi hop
- tree structure
- intermediate nodes
- sensor data