Denial-of-service resistance in key establishment.
Jason SmithSuratose TritilanuntColin BoydJuan Manuel González NietoErnest FooPublished in: Int. J. Wirel. Mob. Comput. (2007)
Keyphrases
- key establishment
- denial of service
- dos attacks
- wireless sensor networks
- sensor networks
- lightweight
- network security
- pairwise
- denial of service attacks
- key management
- secret key
- ddos attacks
- sensor data
- mobile agents
- digital libraries
- data mining
- resource constrained
- security threats
- routing algorithm
- mobile ad hoc networks
- personal information
- real time
- computer networks
- data streams
- databases