Comparing Reputation Schemes for Detecting Malicious Nodes in Sensor Networks.
Partha MukherjeeSandip SenPublished in: Comput. J. (2011)
Keyphrases
- sensor networks
- sensor nodes
- detecting malicious
- wireless sensor networks
- sensor data
- mobile nodes
- network connectivity
- wireless sensor nodes
- energy consumption
- resource constrained
- end hosts
- sink node
- key establishment
- base station
- energy efficient
- data transmission
- communication cost
- routing protocol
- energy efficiency
- data streams
- network traffic
- shortest path
- routing algorithm
- key management scheme
- motion estimation