A review of WPAN security: attacks and prevention.
Todd KennedyRay HuntPublished in: Mobility Conference (2008)
Keyphrases
- denial of service
- security threats
- security mechanisms
- dos attacks
- security problems
- security vulnerabilities
- security measures
- low rate
- cyber attacks
- computer security
- java card
- security protocols
- denial of service attacks
- countermeasures
- security issues
- security breaches
- information security
- cryptographic protocols
- chosen plaintext
- network security
- malicious attacks
- security risks
- fault injection
- security requirements
- stream cipher
- malicious users
- security flaws
- access control
- intrusion detection
- security management
- identity theft
- data transmission
- cryptographic algorithms
- buffer overflow
- secure routing
- information leakage
- insider attacks
- key management
- intrusion prevention
- lightweight
- high speed
- anomaly detection
- advanced encryption standard
- smart card
- security policies
- unauthorized access
- watermarking algorithm
- block cipher