Performance analysis of chaos based WSNs under jamming attack.
Arash TayebiStevan M. BerberAkshya K. SwainPublished in: ISITA (2014)
Keyphrases
- wireless sensor networks
- encryption algorithm
- energy consumption
- energy efficient
- malicious nodes
- sensor networks
- data collection
- routing algorithm
- routing protocol
- secure routing
- energy aware
- countermeasures
- electro mechanical systems
- resource limitations
- mac protocol
- environmental monitoring
- base station
- sensor nodes
- resource constrained
- data gathering
- scheme for wireless sensor networks
- data aggregation
- dos attacks
- energy saving
- wireless communication
- sensing devices
- secret key
- data transmission
- digital content
- body sensor networks
- lightweight