Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks.
Pranav M. PawarRasmus H. NielsenNeeli R. PrasadShingo OhmoriRamjee PrasadPublished in: J. Cyber Secur. Mobil. (2012)
Keyphrases
- comparative evaluation
- security mechanisms
- security threats
- wireless sensor networks
- security problems
- secure routing
- resource constrained
- key management
- computer security
- malicious nodes
- security measures
- security protocols
- security breaches
- cyber attacks
- security vulnerabilities
- java card
- countermeasures
- denial of service attacks
- chosen plaintext
- cryptographic protocols
- fault injection
- security flaws
- information security
- security risks
- security issues
- stream cipher
- malicious users
- energy efficient
- buffer overflow
- access control
- network security
- routing protocol
- security requirements
- intrusion detection
- radio frequency identification rfid
- dos attacks
- information leakage
- cyber security
- ad hoc networks
- data transmission
- advanced encryption standard
- information retrieval
- sql injection
- security policies