Trust-based secure routing and the prevention of vampire attack in wireless ad hoc sensor network.
R. Isaac SajanJ. JasperPublished in: Int. J. Commun. Syst. (2020)
Keyphrases
- sensor networks
- secure routing
- routing protocol
- mobile ad hoc networks
- wireless sensor networks
- multi hop
- ad hoc networks
- network connectivity
- visual sensor networks
- wireless communication
- mobile nodes
- wireless video
- routing scheme
- sensor nodes
- wireless networks
- energy consumption
- routing algorithm
- network topology
- biological inspired
- energy efficient
- data gathering
- data transmission
- sensor data
- wireless sensor
- mobile networks
- resource constrained
- data collection
- residual energy
- mac protocol
- wifi
- energy efficiency
- base station
- energy aware
- data streams
- mobile sensor networks
- mobile devices
- communication cost
- network lifetime
- sensor web
- mobile sensor
- data dissemination
- location based services
- heterogeneous sensor networks