Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming.
Dang The HungTran Trung DuyQuoc Trinh DoPublished in: EAI Endorsed Trans. Ind. Networks Intell. Syst. (2019)
Keyphrases
- multi hop
- reliability analysis
- wireless sensor networks
- cooperative
- base station
- network layer
- physical layer
- node density
- residual energy
- network lifetime
- energy consumption
- communication protocol
- key management
- energy efficient
- security protocols
- transmission power
- wireless networks
- routing algorithm
- wifi
- data transmission
- mac protocol
- cluster head
- ad hoc networks
- mobile ad hoc networks
- sensor networks
- routing protocol
- medium access
- sensor nodes
- information security
- intrusion detection
- wireless mesh networks
- end to end delay
- wireless communication
- energy efficiency
- end to end
- mobile nodes
- power control
- cognitive radio
- mobile networks
- network topology
- application layer
- data analysis
- computational intelligence
- peer to peer
- real time
- sensor data
- condition monitoring
- communication networks
- network security
- mobile users
- power plant