Analyzing the Vulnerability of Wireless Sensor Networks to a Malicious Matched Protocol Attack.
George D. O'MahonyPhilip J. HarrisColin C. MurphyPublished in: ICCST (2018)
Keyphrases
- wireless sensor networks
- malicious nodes
- lightweight
- malicious users
- mac protocol
- data dissemination
- malicious attacks
- energy efficient
- authentication protocol
- key exchange protocol
- malicious behavior
- node selection
- residual energy
- denial of service attacks
- denial of service
- data aggregation
- attack graphs
- dos attacks
- detecting malicious
- sensor networks
- reduce the energy consumption
- wireless communication
- energy consumption
- detect malicious
- routing algorithm
- base station
- routing protocol
- secure routing
- penetration testing
- security analysis
- normal traffic
- attack scenarios
- key establishment
- energy efficiency
- secret key
- malicious activities
- buffer overflow
- data transmission
- resource constrained
- security vulnerabilities
- sensor nodes
- attack graph
- mobile nodes
- security protocols
- wireless networks
- cryptographic protocols
- network security
- computer viruses
- security risks
- key distribution
- ip address