Protecting Resource-Constrained Network Devices from Denial-of-Service Attacks.
HongQian Karen LuPublished in: Security and Management (2010)
Keyphrases
- resource constrained
- denial of service attacks
- network devices
- security threats
- security mechanisms
- resource constraints
- network management
- key management
- sensor networks
- wireless sensor networks
- dos attacks
- intrusion detection system
- network topology
- embedded systems
- ddos attacks
- access control
- lightweight
- multipath
- network traffic
- anomaly detection
- internet protocol
- response time
- data mining