Notre boutique utilise des cookies pour améliorer l'expérience utilisateur et nous vous recommandons d'accepter leur utilisation pour profiter pleinement de votre navigation.
It is of paramount importance to have a mechanism of alienating any suspicious node from a network before it leads to any damage.
In this form of attack which is popularly referred to as camouflage attack, the attacker first compromises an existing sensor node or inserts a malicious node with an intention of later using it.
Once this node joins the network, it will exchange and route messages with the other nodes as a legitimate node, allowing the attacker to gather, modify or inject data.
Benjamin holds BSc Computer Technology (1st Class Honors) from Kenya and a Masters degree in Computer Science and Engineering from Osmania University in India.
His research interests are Cryptography and Computer Security, Networks, Algorithms Design and Implementation.
He has published several research papers in these topics in refereed journals.
Attention : dernières pièces disponibles !
Date de disponibilité: