Login / Signup
Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks.
Kuo-Feng Ssu
Chih-Hsun Chou
Li-Wen Cheng
Published in:
Comput. Commun. (2007)
Keyphrases
</>
detect malicious
wireless sensor networks
detecting malicious
energy efficient
sensor networks
energy consumption
data transmission
sensor nodes
lightweight
base station
routing algorithm
packet loss
routing protocol
energy efficiency
key management
resource constrained