Locating jamming attackers in malicious wireless sensor networks.
Kaiqi XiongDavid J. ThuentePublished in: IPCCC (2012)
Keyphrases
- wireless sensor networks
- malicious attacks
- energy efficient
- sensor networks
- energy consumption
- data aggregation
- energy efficiency
- multi hop
- malicious nodes
- sensor nodes
- environmental monitoring
- data transmission
- resource constrained
- energy aware
- wireless communication
- biological inspired
- data collection
- key management
- routing protocol
- routing algorithm
- malicious users
- data gathering
- base station
- wireless sensor
- real time
- topology control
- malicious behavior
- cognitive radio
- pre determined
- response time
- end to end