A New Protocol for Securing Wireless Sensor Networks against Nodes Replication Attacks.
Chakib BekaraMaryline Laurent-MaknaviciusPublished in: WiMob (2007)
Keyphrases
- secure routing
- wireless sensor networks
- biological inspired
- residual energy
- malicious nodes
- node selection
- sensor nodes
- routing protocol
- ad hoc networks
- routing scheme
- mobile nodes
- fault tolerance
- mac protocol
- sensor networks
- key establishment
- energy consumption
- reduce the energy consumption
- fault tolerant
- security protocols
- energy efficient
- topology control
- cryptographic protocols
- routing algorithm
- base station
- data dissemination
- data transmission
- information security
- wireless communication
- sink node
- group communication
- data aggregation
- key management
- cluster head
- resource constrained
- energy efficiency
- data availability
- directed graph
- multi hop
- sensor data
- peer to peer