Secure localization against wormhole attacks using conflicting sets.
Honglong ChenWei LouZhi WangPublished in: IPCCC (2010)
Keyphrases
- security mechanisms
- security protocols
- stream cipher
- cryptographic protocols
- chosen plaintext
- secure routing
- security measures
- security flaws
- countermeasures
- cryptographic algorithms
- block cipher
- digital images
- information leakage
- key distribution
- security analysis
- insider attacks
- key management
- secret key
- remote user authentication scheme
- watermarking scheme