Login / Signup
On handling insider attacks in wireless sensor networks.
Christoph Krauß
Markus Schneider
Claudia Eckert
Published in:
Inf. Secur. Tech. Rep. (2008)
Keyphrases
</>
insider attacks
wireless sensor networks
attack detection
energy consumption
sensor networks
insider threat
sensor nodes
multi hop
early detection
wireless communication
resource constrained
routing algorithm
customer data
key management
cryptographic protocols
protocol stack