Security Computing for the Resiliency of Protecting from Internal Attacks in Distributed Wireless Sensor Networks.
Xu HuangDharmendra SharmaMuhammad AhmedPublished in: ICA3PP (1) (2012)
Keyphrases
- wireless sensor networks
- malicious nodes
- security mechanisms
- secure routing
- access control
- protection mechanisms
- security threats
- security problems
- resource constrained
- key management
- security protocols
- computer security
- network nodes
- information security
- computer networks
- sensitive data
- unauthorized access
- security measures
- countermeasures
- cyber attacks
- load distribution
- distributed systems
- java card
- cryptographic protocols
- stream cipher
- security vulnerabilities
- security policies
- intrusion detection
- security issues
- malicious users
- fault injection
- mobile agents
- biometric template
- biological inspired
- security risks
- security breaches
- lightweight
- denial of service attacks
- routing protocol
- ad hoc networks
- energy efficient
- inference control
- chosen plaintext
- wireless sensor
- personal data
- sensor nodes
- sensor networks
- privacy issues
- statistical databases
- network security
- smart card
- intrusion detection system
- energy consumption
- anomaly detection