A residual error analysis based secure CS approach for malicious node attack.
Yangqin CaoJun YanWei-Ping ZhuPublished in: CITS (2016)
Keyphrases
- error analysis
- malicious nodes
- malicious users
- wireless sensor networks
- malicious attacks
- malicious behavior
- authentication protocol
- least squares
- key exchange protocol
- error correction
- sensitive data
- network nodes
- cross ratio
- insider attacks
- malicious activities
- authentication mechanism
- block cipher
- security measures
- detecting malicious
- key management
- detect malicious
- key management scheme
- user privacy
- security analysis
- security issues
- information leakage
- computer science
- normal traffic
- user authentication
- key distribution
- countermeasures
- attack detection
- page segmentation
- authentication scheme
- standard model
- secret key