Detecting Compromised Nodes in a Wireless Sensor Network using Trust.
Cheryl V. HindsJim Alves-FossPublished in: SNA (2009)
Keyphrases
- key establishment
- wireless sensor networks
- sensor networks
- sensor nodes
- malicious nodes
- neighboring nodes
- key management
- energy efficient
- base station
- energy consumption
- resource constrained
- data transmission
- data aggregation
- wireless communication
- routing algorithm
- routing protocol
- trust model
- energy efficiency
- website
- node selection
- resource limitations
- topology control
- mobile nodes
- directed graph
- wireless sensor
- virtual teams
- trust management
- electronic commerce
- cluster head
- transmission range
- decision trees
- ad hoc networks
- social networks