Login / Signup
Handling the Evil Ring Attack on Localization and Routing in Wireless Sensor Networks.
Wei Shi
Michel Barbeau
Joaquín García-Alfaro
Jean-Pierre Corriveau
Published in:
Ad Hoc Sens. Wirel. Networks (2012)
Keyphrases
</>
energy efficient
secret key
activity detection
object localization
key exchange protocol
source localization
block cipher
databases
information retrieval
power consumption
energy consumption
case study
algebraic structure
power analysis
accurate localization
data corruption
neural network