Modeling a node capture attack in a secure wireless sensor networks.
Meriem SmacheNadia El MrabetJesus-Javier GilquijanoAssia TriaEmmanuel RiouChaput GregoryPublished in: WF-IoT (2016)
Keyphrases
- wireless sensor networks
- malicious nodes
- topology control
- key management scheme
- directed graph
- energy efficient
- node selection
- sensor networks
- lightweight
- energy consumption
- key establishment
- secret key
- key exchange protocol
- biological inspired
- residual energy
- block cipher
- key management
- resource constrained
- sensor nodes
- tree structure