goal of, 230
LFSS (Local Feature Set Scheme), 182
lightweight hop-by-hop authentication protocol (LHAP), 194
limited node compromises, 289–292
defined, 282
detection approaches, 283–284
false positives, 291–292
location distinction schemes, 284
mobile detection, 291–292
mobile malicious node detection, 284
related work, 282–284
reputation-based schemes, 283
software-attestation schemes, 282–283
static detection, 290–291, see also
Node compromise detection (WSNs)
linear algebra problem, 476
linear time-invariant (LTI) dynamics, 20
LKH (logical key hierarchy), 160–161
local authentication, 229
Local Feature Set Scheme (LFSS), 182
localization system
architecture illustration, 216
attack localizer, 217
error CDF, 218
experimental ...
Get Handbook on Securing Cyber-Physical Critical Infrastructure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.