Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast.
Gal BadishiIdit KeidarAmir SassonPublished in: IEEE Trans. Dependable Secur. Comput. (2006)
Keyphrases
- denial of service attacks
- security threats
- security issues
- denial of service
- security mechanisms
- dos attacks
- security vulnerabilities
- key management
- security patterns
- key management scheme
- lightweight
- information security
- security requirements
- network security
- resource constrained
- routing algorithm
- wireless networks
- intrusion detection system
- ddos attacks
- access control
- wireless sensor networks
- overlay network
- end to end
- ad hoc networks
- cloud computing
- end hosts
- smart card
- operating system
- computer systems