Attack-tolerant localization via iterative verification of locations in sensor networks.
Taejoon ParkKang G. ShinPublished in: ACM Trans. Embed. Comput. Syst. (2008)
Keyphrases
- sensor networks
- wireless sensor networks
- sensor nodes
- data collection
- environmental monitoring
- sensor data
- resource constrained
- mobile wireless
- data streams
- communication cost
- underwater acoustic
- base station
- energy consumption
- energy efficient
- communication bandwidth
- sensor readings
- data aggregation
- location information
- secret key
- data gathering
- energy efficiency
- network connectivity
- sensor web
- wireless communication
- routing protocol
- real time
- data dissemination
- multipath
- energy aware
- pairwise
- sensing devices