Keyphrases
Random Walk
100%
Clone Attack
100%
Wireless Security
100%
Non-deterministic
66%
Adversary
66%
Communication Overhead
50%
Fully Distributed
33%
Fully Distributed Protocol
33%
Memory Overhead
33%
Hostile Environment
16%
Multicast
16%
Centralized Control
16%
Security Requirements
16%
Wireless Sensor Networks
16%
Low Memory
16%
Number of Walks
16%
Smart Attacks
16%
Replica Detection
16%
Random Walk Strategy
16%
Low Overhead
16%
Detection Protocol
16%
Internal Attacks
16%
Computer Science
Wireless Sensor Network
100%
Random Walk
100%
Communication Overhead
33%
Distributed Protocol
33%
Security Requirements
16%
Multicasting
16%
Existing Protocol
16%
Internal Attack
16%
Random Walk Strategy
16%
Arbitrary Number
16%
Hostile Environment
16%