Information-theoretic approach for secure localization against sybil attack in wireless sensor network.
Arindam GiriSubrata DuttaSarmistha NeogyPublished in: J. Ambient Intell. Humaniz. Comput. (2021)
Keyphrases
- wireless sensor networks
- malicious nodes
- key management
- key establishment
- malicious users
- key exchange protocol
- secret key
- security measures
- authentication mechanism
- key management scheme
- detection mechanism
- authentication protocol
- block cipher
- sensitive data
- sensor nodes
- sensor networks
- information leakage
- security issues
- lightweight
- countermeasures
- user privacy
- resource limitations
- diffie hellman
- resource constrained
- key distribution
- security protocols
- security requirements
- base station
- routing algorithm
- information security
- energy consumption
- identity management
- cryptographic protocols
- security services
- s box
- security analysis
- security mechanisms
- key exchange
- encryption scheme
- anomaly detection
- mobile robot