Entrapping Adversaries for Source Protection in Sensor Networks.
Yi OuyangZhengyi LeGuanling ChenJames FordFillia MakedonPublished in: WOWMOM (2006)
Keyphrases
- sensor networks
- wireless sensor networks
- sensor data
- environmental monitoring
- data collection
- sensor nodes
- data streams
- sensor readings
- underwater acoustic
- resource constrained
- energy consumption
- energy efficient
- communication bandwidth
- energy efficiency
- data sets
- data aggregation
- information security
- routing protocol
- sensor web
- base station
- mobile nodes
- data gathering
- data dissemination
- computational complexity
- sensing devices
- wireless sensor nodes
- mobile sensor networks