Protecting Wireless Sensor Networks from Energy Exhausting Attacks.
Vladimir V. ShakhovPublished in: ICCSA (1) (2013)
Keyphrases
- wireless sensor networks
- energy consumption
- energy efficient
- sensor nodes
- energy efficiency
- energy saving
- sensor networks
- network lifetime
- energy conservation
- energy aware
- malicious nodes
- data aggregation
- data transmission
- cluster head
- wireless sensor nodes
- topology control
- environmental monitoring
- base station
- secure routing
- residual energy
- security threats
- key management
- routing protocol
- routing algorithm
- multi hop
- protection mechanisms
- resource constrained
- wireless communication
- data gathering
- network connectivity
- countermeasures
- watermarking scheme
- reduce the energy consumption
- sink node
- power consumption
- node selection
- security mechanisms
- energy minimization
- chosen plaintext
- energy dissipation
- unauthorized access
- network security
- denial of service attacks
- watermarking algorithm
- wireless sensor
- security protocols