A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs.
Honglong ChenWei LouZhi WangPublished in: WASA (2009)
Keyphrases
- secure routing
- scheme for wireless sensor networks
- stream cipher
- routing scheme
- chosen plaintext
- key management scheme
- ad hoc networks
- biological inspired
- wireless sensor networks
- key management
- security mechanisms
- routing protocol
- security protocols
- resource constrained
- remote user authentication scheme
- mobile ad hoc networks
- security analysis
- hash functions
- key establishment
- secret key
- cryptographic protocols
- key distribution
- authentication scheme
- security issues
- diffie hellman
- provably secure
- secure communication
- energy efficient
- energy consumption
- data aggregation
- quality of service