A survey: energy exhausting attacks in MAC protocols in WBANs.
Minho JoLongzhe HanNguyen Duy TanHoh Peter InPublished in: Telecommun. Syst. (2015)
Keyphrases
- resource constrained
- security protocols
- security mechanisms
- cryptographic protocols
- energy consumption
- medium access
- sensing devices
- energy minimization
- data transmission
- countermeasures
- security flaws
- wireless sensor networks
- sensor nodes
- key management
- security threats
- sensor networks
- multipath
- watermarking scheme
- malicious attacks
- energy efficient
- communication protocols
- security risks
- cost effective