A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks.
Adnan AhmedKamalrulnizam Abu BakarMuhammad Ibrahim ChannaKhalid HaseebAbdul Waheed KhanPublished in: Frontiers Comput. Sci. (2015)
Keyphrases
- sensor networks
- wireless sensor networks
- malicious nodes
- sensor data
- sensor nodes
- energy consumption
- environmental monitoring
- underwater acoustic
- base station
- energy efficient
- resource constrained
- data streams
- communication bandwidth
- routing protocol
- mobile sensor networks
- sensor web
- heterogeneous sensor networks
- energy efficiency
- communication cost
- anomaly detection
- key technologies
- mobile users
- social networks