Security enhanced multi-hop over the air reprogramming with Fountain Codes.
Jens-Matthias BohliAlban HesslerOsman UgusDirk WesthoffPublished in: LCN (2009)
Keyphrases
- multi hop
- wireless sensor networks
- sensor nodes
- mobile ad hoc networks
- physical layer
- wireless networks
- data transmission
- end to end
- ad hoc networks
- base station
- energy efficient
- wireless ad hoc networks
- key management
- energy consumption
- network layer
- information security
- routing protocol
- sensor networks
- intrusion detection
- power control
- routing algorithm
- error correction
- wifi
- sensor data
- real time
- hop count
- transmission power
- end to end delay
- security protocols
- data streams
- metadata