Scrutinising well-known countermeasures against clone node attack in mobile wireless sensor networks.
Wazir Zada KhanMohamad Naufal bin Mohamad SaadMohammed Y. AalsalemPublished in: Int. J. Grid Util. Comput. (2013)
Keyphrases
- countermeasures
- wireless sensor networks
- mobile nodes
- node selection
- routing protocol
- topology control
- adhoc network
- network connectivity
- information security
- mobile networks
- malicious nodes
- sensor networks
- power analysis
- residual energy
- ad hoc networks
- energy efficient
- base station
- energy consumption
- resource constrained
- sensor nodes
- wireless networks
- mobile devices
- routing algorithm
- energy efficiency
- security measures
- data transmission
- multi hop
- wireless communication
- rural areas
- cyber attacks
- mobile ad hoc networks
- java card
- mobile users
- databases
- real world
- key management
- shortest path
- lightweight