A Scheme for Adaptively Countering Application Layer Security Attacks in Wireless Sensor Networks.
Hae Young LeeTae Ho ChoPublished in: IEICE Trans. Commun. (2010)
Keyphrases
- application layer
- wireless sensor networks
- physical layer
- network layer
- chosen plaintext
- ddos attacks
- security mechanisms
- malicious nodes
- cross layer
- secure routing
- resource constrained
- key management
- security protocols
- network congestion
- energy efficient
- transport layer
- wireless communication
- security issues
- key distribution
- routing protocol
- intrusion detection
- stream cipher
- access control
- security analysis
- multi hop
- end to end
- sensor networks
- sensor nodes
- energy consumption
- security requirements
- video streaming
- information security
- mac protocol
- energy efficiency