A novel traffic-analysis back tracing attack for locating source nodes in wireless sensor networks.
Mohamed Elsalih MahmoudXuemin (Sherman) ShenPublished in: ICC (2012)
Keyphrases
- traffic analysis
- wireless sensor networks
- malicious nodes
- sensor nodes
- node selection
- network security
- sensor networks
- topology control
- energy consumption
- network traffic
- residual energy
- network nodes
- mobile nodes
- routing protocol
- multi hop
- ip addresses
- internet traffic
- traffic data
- routing algorithm
- ad hoc networks
- computer networks
- knowledge discovery