Attack Resilience and Recovery using Physical Challenge Response Authentication for Active Sensors Under Integrity Attacks.
Yasser ShoukryPaul MartinYair YonaSuhas N. DiggaviMani B. SrivastavaPublished in: CoRR (2016)
Keyphrases
- countermeasures
- attack detection
- detect malicious
- malicious users
- malicious attacks
- differential power analysis
- denial of service attacks
- security mechanisms
- attack scenarios
- integrity verification
- authentication mechanism
- semi fragile watermarking
- physical world
- sensor networks
- authentication protocol
- ddos attacks
- power analysis
- dos attacks
- security risks
- digital watermarking
- detecting malicious
- data corruption
- fault injection
- security vulnerabilities
- digital watermark
- fragile watermarking scheme
- security measures
- information security
- block cipher
- cyber attacks
- smart card
- biometric authentication
- watermarking scheme
- defense mechanisms
- security protocols
- network attacks
- fragile watermarking
- security analysis
- normal traffic
- injection attacks
- java card
- information leakage
- resource constrained
- secret key
- rfid tags
- malicious nodes