Reactive security scheme using behavioral aspects of attacks for Wireless Sensor Networks.
Roshan Zameer AhmedAnusha AnigolRajashekhar C. BiradarPublished in: ICACCI (2013)
Keyphrases
- wireless sensor networks
- key management scheme
- chosen plaintext
- secure routing
- malicious nodes
- key establishment
- security threats
- key management
- security mechanisms
- routing scheme
- security protocols
- security problems
- java card
- resource constrained
- computer security
- security flaws
- authentication scheme
- denial of service attacks
- security vulnerabilities
- security breaches
- sensor networks
- sensor nodes
- information security
- security model
- energy consumption
- security issues
- security measures
- smart card
- cyber attacks
- malicious users
- security requirements
- biological inspired
- network security
- provably secure
- countermeasures
- cryptographic protocols
- ad hoc networks
- stream cipher
- buffer overflow
- security analysis
- elliptic curve cryptography
- authentication protocol
- anomaly detection
- wireless networks
- routing protocol
- intrusion detection
- biometric template
- residual energy
- blind signature scheme
- key agreement protocol
- security risks
- mobile nodes
- security properties
- wireless sensor