A Bloom Filter and Matrix-based Protocol for Detecting Node Replication Attack.
Weimin XieLiejun WangMingwei WangPublished in: J. Networks (2014)
Keyphrases
- bloom filter
- group communication
- data structure
- key exchange protocol
- authentication protocol
- join processing
- residual energy
- replicated data
- lightweight
- record linkage
- denial of service attacks
- distributed databases
- ip addresses
- reservoir sampling
- malicious nodes
- mobile nodes
- membership queries
- fault tolerant
- data availability
- security analysis
- wireless sensor networks
- data replication
- dos attacks
- fault tolerance
- wireless networks
- attack scenarios
- high dimensional