False Report Injection And Remote Attack Detection Method using Security Trajectory in WSN-based Fire Detection IoT.
Yelim KangTaeho ChoPublished in: AICCC (2023)
Keyphrases
- detection method
- key management
- wireless sensor networks
- security measures
- cyber attacks
- heterogeneous wireless sensor networks
- security problems
- secret key
- face detection
- detection algorithm
- fault injection
- denial of service attacks
- security vulnerabilities
- key exchange protocol
- malicious users
- key management scheme
- countermeasures
- information security
- feature detection
- security issues
- radio frequency identification rfid
- smart home
- rfid systems
- authentication protocol
- security protocols
- management system
- dos attacks
- sensor networks
- network security
- security mechanisms
- defense mechanisms
- authentication mechanism
- malicious nodes
- smart card
- ad hoc networks
- security policies
- security requirements
- sensor nodes
- encryption algorithm
- cloud computing
- access control
- key distribution
- attack scenarios
- resource constrained
- ddos attacks
- diffie hellman
- security properties
- intrusion detection
- object detection
- removal of impulse noise