On Security Attacks in HealthcareWSNs Implemented on 802.15.4 Beacon Enabled Clusters.
Jelena V. MisicFereshteh AminiMoazzam KhanPublished in: CCNC (2007)
Keyphrases
- security threats
- security mechanisms
- security problems
- computer security
- security protocols
- security issues
- security measures
- security vulnerabilities
- denial of service attacks
- information security
- cyber attacks
- clustering algorithm
- security risks
- java card
- countermeasures
- chosen plaintext
- security requirements
- malicious attacks
- security breaches
- network security
- computer networks
- wireless sensor networks
- security flaws
- fault injection
- access control
- hierarchical clustering
- cryptographic protocols
- dos attacks
- intrusion detection
- data points
- malicious nodes
- malicious users
- statistical databases
- anomaly detection
- smart card
- insider attacks
- key management