Simulation of Attacks for Security in Wireless Sensor Network.
Álvaro Díaz SuárezPablo Sánchez EspesoPublished in: Sensors (2016)
Keyphrases
- wireless sensor networks
- security mechanisms
- security problems
- security threats
- security protocols
- resource constrained
- java card
- malicious nodes
- denial of service attacks
- secure routing
- security vulnerabilities
- computer security
- security measures
- key management
- security breaches
- security flaws
- chosen plaintext
- malicious attacks
- security policies
- security risks
- information security
- security issues
- countermeasures
- network security
- malicious users
- sensor networks
- intrusion prevention
- key establishment
- key management scheme
- cyber attacks
- stream cipher
- unauthorized access
- wireless sensor
- biometric template
- buffer overflow
- resource limitations
- identity theft
- smart card
- energy consumption
- security requirements
- intrusion detection and prevention