A defense against clock skew replication attacks in wireless sensor networks.
Ding-Jie HuangWei-Chung TengPublished in: J. Netw. Comput. Appl. (2014)
Keyphrases
- wireless sensor networks
- defense mechanisms
- ddos attacks
- malicious nodes
- energy efficient
- secure routing
- resource constrained
- sensor nodes
- sensor networks
- data aggregation
- fault tolerant
- security mechanisms
- base station
- power consumption
- fault tolerance
- countermeasures
- computer virus
- network security
- energy efficiency
- data transmission
- key management
- distributed databases
- high speed
- energy consumption
- malicious users
- malicious attacks
- security threats
- environmental monitoring
- data gathering
- watermarking scheme
- security protocols
- routing algorithm
- topology control
- data partitioning
- multi hop
- advanced research projects agency
- routing protocol
- group communication
- data replication
- watermarking technique
- computer security
- biological inspired
- dos attacks
- intrusion detection
- aspect ratio