Keyphrases
- wireless sensor networks
- secure routing
- malicious nodes
- energy efficient
- sensor networks
- sensor nodes
- biological inspired
- data aggregation
- countermeasures
- energy consumption
- key management
- environmental monitoring
- energy efficiency
- watermarking scheme
- multi hop
- routing algorithm
- base station
- data gathering
- traffic analysis
- routing protocol
- security protocols
- security threats
- data transmission
- malicious users
- topology control
- attack detection
- malicious attacks
- denial of service attacks
- risk management
- resource constrained
- computer security
- residual energy
- routing scheme
- shortest path
- digital images
- body sensor networks