Detecting node replication attacks in wireless sensor networks: A survey.
Wen Tao ZhuJianying ZhouRobert H. DengFeng BaoPublished in: J. Netw. Comput. Appl. (2012)
Keyphrases
- wireless sensor networks
- malicious nodes
- node selection
- topology control
- sensor nodes
- sensor networks
- energy efficient
- energy consumption
- data aggregation
- fault tolerant
- secure routing
- network nodes
- fault tolerance
- residual energy
- cluster head
- mobile nodes
- distributed databases
- base station
- environmental monitoring
- black hole
- network intrusion detection systems
- neighboring nodes
- detecting malicious
- resource constrained
- data transmission
- wireless communication
- routing protocol
- energy efficiency
- watermarking scheme
- routing algorithm
- multi hop
- countermeasures
- biological inspired
- detect malicious
- security mechanisms
- social networks
- security threats
- key management scheme
- tree structure
- peer to peer