Interdependent Conclusive Data Retention

Download Now
Provided by: PicoSoft Technologies
Topic: Big Data
Format: PDF
During the last decade, reactive jamming attack has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. Considering the specific characteristics of reactive jammer nodes, a new scheme to deactivate them by efficiently identifying all trigger nodes, whose transmissions invoke the jammer nodes, has been proposed and developed. Such a trigger identification procedure can work as an application-layer service and benefit many existing reactive-jamming defending schemes.
Download Now

Find By Topic