Security model against worms attack in wireless sensor network.
Rudra Pratap OjhaPramod Kumar SrivastavaGoutam SanyalPublished in: Int. J. Adv. Intell. Paradigms (2019)
Keyphrases
- security model
- wireless sensor networks
- public key
- security analysis
- access control
- security requirements
- denial of service attacks
- secret key
- authentication protocol
- energy consumption
- sensor networks
- network traffic
- provably secure
- sensor nodes
- encryption scheme
- lightweight
- designated verifier
- ip addresses
- ciphertext
- ddos attacks
- resource constrained
- intrusion detection
- dos attacks