Exploiting Impact of Eavesdropping Attacks on Secrecy Performance in WPT-based Secure Multi-hop Transmission.
Kyusung ShimBeongku AnPublished in: ICUFN (2023)
Keyphrases
- multi hop
- data transmission
- power control
- key management
- ad hoc networks
- wireless sensor networks
- security protocols
- wireless ad hoc networks
- key distribution
- mobile ad hoc networks
- base station
- transmission power
- wireless networks
- cryptographic protocols
- energy efficient
- end to end
- security properties
- routing protocol
- energy consumption
- resource management
- physical layer
- security mechanisms
- security analysis
- routing algorithm
- computer networks
- sensor networks
- communication networks
- power consumption
- network topology
- wireless mesh networks
- wifi
- security issues
- sensor nodes
- resource constrained
- secret key
- real time