Login / Signup
A trust-based approach against IP-spoofing attacks.
Jesus M. Gonzalez
Mohd Anwar
James B. D. Joshi
Published in:
PST (2011)
Keyphrases
</>
ddos attacks
malicious nodes
trust model
countermeasures
wireless sensor networks
watermarking scheme
security mechanisms
ip networks
application layer
computer security
cryptographic protocols
ip address
malicious attacks
identity theft
malicious traffic