Sensor node source privacy and packet recovery under eavesdropping and node compromise attacks.
Kanthakumar PongaliurLi XiaoPublished in: ACM Trans. Sens. Networks (2013)
Keyphrases
- sensor nodes
- wireless sensor networks
- destination node
- node selection
- sensed data
- source node
- node density
- malicious nodes
- sensor networks
- sink node
- intermediate nodes
- energy consumption
- neighboring nodes
- routing protocol
- key pre distribution scheme
- residual energy
- security mechanisms
- data transmission
- resource constrained
- active learning
- relay nodes
- mobile sensor networks
- stepping stones
- energy efficiency
- topology control
- energy efficient
- multi hop
- network lifetime
- data collection
- shortest path
- cluster head
- sensor data
- black hole
- directed graph
- privacy preserving
- base station
- ad hoc networks
- mobile ad hoc networks
- routing algorithm
- network layer
- security issues
- wireless communication
- personal data
- energy dissipation
- mobile nodes
- location information
- data acquisition
- privacy protection
- network topology