Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks.
Seth GilbertRachid GuerraouiCalvin C. NewportPublished in: OPODIS (2006)
Keyphrases
- wireless networks
- detect malicious
- sensor networks
- detecting malicious
- wireless communication
- base station
- wireless mesh networks
- ad hoc networks
- wireless sensor networks
- wireless ad hoc networks
- low bandwidth
- wireless sensor
- mobile wireless
- cellular networks
- access points
- real time
- link layer
- insider threat
- network coding
- wired networks
- mobile computing
- multi hop
- data transmission
- mobile nodes
- sensor data
- cross layer
- network access
- anomaly detection
- multipath
- communication networks
- wireless technologies
- wifi
- multimedia services
- mobile networks