Malware propagation model in wireless sensor networks under attack-defense confrontation.
Haiping ZhouShigen ShenJianhua LiuPublished in: Comput. Commun. (2020)
Keyphrases
- propagation model
- wireless sensor networks
- defense mechanisms
- attack scenarios
- ddos attacks
- network security
- ad hoc networks
- energy efficient
- malicious nodes
- sensor networks
- intrusion detection
- dos attacks
- detect malicious
- anti virus
- detecting malicious
- routing protocol
- base station
- energy consumption
- malware detection
- data transmission
- vehicular networks
- multi hop
- energy efficiency
- data aggregation
- wireless communication
- alert correlation
- free space
- routing algorithm
- routing scheme
- sensor nodes
- malicious code
- countermeasures
- reverse engineering
- biological inspired
- attack detection
- wireless sensor
- control flow
- static analysis
- denial of service attacks
- secret key
- dynamic analysis
- key management
- computer viruses