Attacks And Counterattacks On Wireless Sensor Networks.
Nusrat FatemaRemus BradPublished in: CoRR (2014)
Keyphrases
- wireless sensor networks
- secure routing
- sensor networks
- energy consumption
- energy efficient
- malicious nodes
- countermeasures
- data aggregation
- routing protocol
- sensor nodes
- multi hop
- base station
- resource constrained
- wireless communication
- environmental monitoring
- routing algorithm
- energy efficiency
- malicious attacks
- security threats
- residual energy
- attack detection
- energy aware
- security protocols
- computer security
- watermarking scheme
- traffic analysis
- wireless sensor
- data gathering
- topology control
- stream cipher
- routing scheme
- watermarking algorithm