An energy-efficient random verification protocol for the detection of node clone attacks in wireless sensor networks.
Yuping ZhouZhenjie HuangJuan WangRufen HuangDongmei YuPublished in: EURASIP J. Wirel. Commun. Netw. (2014)
Keyphrases
- wireless sensor networks
- node selection
- residual energy
- malicious nodes
- cryptographic protocols
- secure routing
- energy efficient
- mac protocol
- mobile nodes
- energy efficiency
- sensor nodes
- energy consumption
- data dissemination
- sensor networks
- cluster head
- topology control
- lightweight
- security protocols
- routing scheme
- routing protocol
- data gathering
- biological inspired
- chosen plaintext
- routing algorithm
- resource constrained
- key management
- formal analysis
- attack detection
- multi hop
- data transmission
- network lifetime
- java card
- key management scheme
- key establishment
- denial of service attacks
- ad hoc networks
- network attacks
- anomaly detection