A provenance based defensive technique to determine malevolent selective forwarding attacks in multi-hop wireless sensor networks.
Sujesh LalJoe Prathap PathrosePublished in: J. Ambient Intell. Humaniz. Comput. (2021)
Keyphrases
- multi hop
- wireless sensor networks
- transmission power
- energy efficient
- wireless networks
- network layer
- base station
- data transmission
- ad hoc networks
- intermediate nodes
- routing protocol
- sensor nodes
- energy consumption
- mobile ad hoc networks
- wireless ad hoc networks
- end to end
- routing algorithm
- sensor networks
- power control
- biological inspired
- network lifetime
- network connectivity
- metadata
- wireless communication
- response time
- wifi
- end to end delay
- data collection
- key management
- topology control
- energy efficiency
- information sources
- transmission range