The document discusses various security threats in wireless sensor networks such as denial of service (DOS) attacks, Sybil attacks, wormhole attacks, and Hello flood attacks. It then provides solutions and techniques to mitigate these threats, including using encryption methods like ECC and RSA, and protocols like LEAP. Multicasting and broadcasting in wireless sensor networks is also briefly covered.
33. - >@ >
Agree on E , G
Alice chooses random KA TA = KA * G Bob chooses random KB
TB = KB * G
Compute KB * TA
Compute KA * TB
Agree on G * KB * KA 33