Security against Sybil Attack in Wireless Sensor Network through Location Verification.
Indranil SahaDebapriyay MukhopadhyayPublished in: ICDCN (2009)
Keyphrases
- wireless sensor networks
- malicious nodes
- malicious users
- java card
- high security
- fault injection
- sensor nodes
- sensor networks
- resource constrained
- energy consumption
- cyber attacks
- key management
- base station
- integrity verification
- countermeasures
- wireless sensor
- encryption algorithm
- authentication protocol
- security measures
- key exchange protocol
- smart card
- security vulnerabilities
- location information
- denial of service attacks
- security risks
- detection mechanism
- cryptographic protocols
- security mechanisms
- network nodes
- resource limitations
- dos attacks
- model checking
- access control
- security analysis
- attack scenarios
- security issues