Using Time-Location Tags and Watchdog Nodes to Defend Against Node Replication Attack in Mobile Wireless Sensor Networks.
Mojtaba JamshidiMehdi EsnaashariAso Mohammad DarweshMohammad Reza MeybodiPublished in: Int. J. Wirel. Inf. Networks (2020)
Keyphrases
- malicious nodes
- wireless sensor networks
- mobile nodes
- geo tagged
- adhoc network
- sensor nodes
- node selection
- network nodes
- network connectivity
- routing protocol
- sensor networks
- ad hoc networks
- mobile networks
- topology control
- energy efficient
- energy consumption
- location information
- base station
- mobile ad hoc networks
- black hole
- wireless networks
- distributed databases
- multi hop
- wireless communication
- routing algorithm
- energy efficiency
- mobile phone
- mobile objects
- key management
- mobile devices
- fault tolerant
- fault tolerance
- transmission range
- peer to peer
- residual energy
- intermediate nodes
- mobile applications
- mobile users
- location based services
- wireless sensor nodes
- data transmission
- mac protocol
- mobile environments