Protection against Byzantine Attacks on Wireless Sensor Networks.
Björn SteltePublished in: WINSYS (2011)
Keyphrases
- wireless sensor networks
- secure routing
- malicious nodes
- energy efficient
- fault tolerant
- sensor networks
- resource constrained
- data aggregation
- energy consumption
- countermeasures
- base station
- sensor nodes
- multi hop
- data transmission
- environmental monitoring
- biological inspired
- security mechanisms
- watermarking scheme
- wireless communication
- key management
- routing protocol
- routing algorithm
- energy efficiency
- residual energy
- computer security
- data gathering
- security threats
- malicious attacks
- chosen plaintext
- watermarking algorithm
- end to end
- routing scheme
- attack detection
- terrorist attacks
- security risks
- wireless sensor
- security protocols