Network steganography based on traffic behavior in dynamically changing wireless sensor networks.
Xiangyu NiuJinyuan SunHusheng LiPublished in: ICC (2015)
Keyphrases
- dynamically changing
- traffic patterns
- wireless sensor networks
- network traffic
- traffic analysis
- sensor networks
- energy consumption
- origin destination
- traffic data
- network traffic monitoring
- internet traffic
- telecommunication networks
- data aggregation
- traffic flow
- routing algorithm
- network resources
- energy efficient
- data transmission
- wireless sensor
- base station
- shop floor
- communication networks
- peer to peer