Tampering with Motes: Real-World Attacks on Wireless Sensor Networks.
Alexander BecherZinaida BenensonMaximillian DornseifPublished in: Sicherheit (2006)
Keyphrases
- wireless sensor networks
- real world
- sensor nodes
- watermarking scheme
- sensor networks
- data aggregation
- resource constrained
- energy efficient
- energy consumption
- base station
- malicious nodes
- wireless sensor
- energy efficiency
- routing algorithm
- multi hop
- wireless communication
- malicious attacks
- key management
- data transmission
- countermeasures
- energy saving
- security mechanisms
- digital images
- robust watermarking scheme
- forensic analysis
- case study
- authentication scheme
- reverse engineering
- digital watermarking
- security protocols
- watermarking algorithm
- detecting malicious
- secure routing