Malicious Node Detection in Wireless Sensor Networks Using an Efficient Secure Data Aggregation Protocol.
S. GomathiC. Gopala KrishnanPublished in: Wirel. Pers. Commun. (2020)
Keyphrases
- data aggregation
- wireless sensor networks
- node selection
- key management scheme
- residual energy
- key establishment
- malicious nodes
- key management
- scheme for wireless sensor networks
- lightweight
- sensor networks
- energy efficient
- data dissemination
- secure routing
- sensor nodes
- energy consumption
- mobile nodes
- key distribution
- topology control
- cluster head
- base station
- sink node
- energy efficiency
- authentication protocol
- cryptographic protocols
- security protocols
- routing protocol
- data transmission
- security analysis
- routing algorithm
- resource constrained
- reduce the energy consumption
- network lifetime
- multi hop
- covert channel
- data collection
- data center
- wireless communication
- directed graph
- anomaly detection