An Impersonation Attack Detection Method Using Bloom Filters and Dispersed Data Transmission for Wireless Sensor Networks.
Noriaki TanabeEitaro KohnoYoshiaki KakudaPublished in: GreenCom (2012)
Keyphrases
- detection method
- data transmission
- bloom filter
- wireless sensor networks
- authentication protocol
- sensor nodes
- base station
- energy consumption
- smart card
- data structure
- sensor networks
- security analysis
- energy efficient
- detection algorithm
- multi hop
- data delivery
- malicious nodes
- routing protocol
- face detection
- secret key
- data collection
- record linkage
- energy efficiency
- routing algorithm
- membership queries
- encryption algorithm
- communication networks
- rfid tags
- public key
- index structure
- cluster head
- machine learning
- real time