Using a secure permutational covert channel to detect local and wide area interposition attacks.
Jaroslaw PaduchJamie LevyBilal KhanPublished in: IWCMC (2009)
Keyphrases
- wireless sensor networks
- covert channel
- security requirements
- network traffic
- normal traffic
- security mechanisms
- network attacks
- secure routing
- intrusion detection
- countermeasures
- data mining
- chosen plaintext
- smart card
- software architecture
- sensitive data
- security protocols
- cryptographic protocols
- normal behavior
- computer systems
- detecting malicious