Node authentication algorithm for securing static wireless sensor networks from node clone attack.
Vandana MohindruYashwant SinghPublished in: Int. J. Inf. Comput. Secur. (2018)
Keyphrases
- node selection
- tree structure
- cost function
- graph structure
- wireless sensor networks
- segmentation algorithm
- dynamic programming
- detection algorithm
- computational complexity
- learning algorithm
- directed graph
- selection algorithm
- worst case
- active learning
- optimal solution
- optimal path
- path length
- k means
- np hard
- search space
- genetic algorithm
- expectation maximization
- preprocessing
- similarity measure
- identity management