A secure routing scheme to mitigate attack in wireless adhoc sensor network.
R. Isaac SajanJ. JasperPublished in: Comput. Secur. (2021)
Keyphrases
- routing scheme
- sensor networks
- wireless sensor networks
- secure routing
- routing protocol
- wireless communication
- multi hop
- key establishment
- mobile ad hoc networks
- network connectivity
- key management
- visual sensor networks
- sensor nodes
- key management scheme
- ad hoc networks
- energy efficient
- mobile nodes
- data gathering
- routing algorithm
- energy consumption
- resource constrained
- wireless sensor
- base station
- authentication protocol
- mac protocol
- data collection
- data transmission
- wireless networks
- sensor data
- mobile networks
- energy efficiency
- communication cost
- network topology
- mobile sensor networks
- network layer
- key distribution
- sensing devices
- mobile users
- sensor web
- wireless channels
- security analysis
- mobile devices
- data streams