Sinkhole Attacks in Wireless Sensor Networks: A Survey.
Aqeel-ur RehmanSadiq ur RehmanHaris RaheemPublished in: Wirel. Pers. Commun. (2019)
Keyphrases
- wireless sensor networks
- secure routing
- energy efficient
- sensor networks
- malicious nodes
- energy consumption
- data aggregation
- resource constrained
- routing algorithm
- countermeasures
- topology control
- environmental monitoring
- sensor nodes
- data transmission
- energy efficiency
- security mechanisms
- data gathering
- multi hop
- watermarking scheme
- routing protocol
- biological inspired
- wireless communication
- terrorist attacks
- base station
- routing scheme
- traffic analysis
- malicious users
- signal processing
- malicious attacks
- ddos attacks
- computer security
- key management
- watermarking algorithm