A Note-Based Randomized and Distributed Protocol for Detecting Node Replication Attacks in Wireless Sensor Networks.
Xiangshan MengKai LinKeqiu LiPublished in: ICA3PP (1) (2010)
Keyphrases
- wireless sensor networks
- secure routing
- malicious nodes
- residual energy
- node selection
- group communication
- network nodes
- lightweight
- ad hoc networks
- mobile nodes
- fault tolerant
- routing scheme
- cryptographic protocols
- peer to peer
- security protocols
- key management
- distributed environment
- energy efficiency
- sensor networks
- distributed databases
- biological inspired
- distributed systems
- topology control
- query routing
- sensor nodes
- fault tolerance
- routing protocol
- energy efficient
- denial of service attacks
- energy consumption
- wireless networks
- wide area network
- mac protocol
- replicated data
- key management scheme
- base station
- cooperative
- database replication
- black hole
- key establishment
- multi hop
- routing algorithm
- commit protocols
- mobile ad hoc networks
- resource constrained
- sink node
- mobile agents
- communication cost
- distributed database systems
- data transmission