Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/3774
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Korkmaz I. | - |
dc.contributor.author | Dagdeviren O. | - |
dc.contributor.author | Tekbacak F. | - |
dc.contributor.author | Dalkilic M.E. | - |
dc.date.accessioned | 2023-06-16T15:03:12Z | - |
dc.date.available | 2023-06-16T15:03:12Z | - |
dc.date.issued | 2013 | - |
dc.identifier.isbn | 9781466640313 | - |
dc.identifier.isbn | 1466640308 | - |
dc.identifier.isbn | 9781466640306 | - |
dc.identifier.uri | https://doi.org/10.4018/978-1-4666-4030-6.ch010 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14365/3774 | - |
dc.description.abstract | Wireless Sensor Network (WSN) is a promising technology that has attracted the interest of research in the last decade. Security is one of the fundamental issues in sensor networks since sensor nodes are very resource constrained. An attacker may modify, insert, and delete new hardware and software components to the system where a single node, a specific part of the sensing area, and the whole network may become inoperable. Thus, the design of early attack detection and defense mechanisms must be carefully considered. In this chapter, the authors survey attacks and their defense mechanisms in WSNs. Attacks are categorized according to the related protocol layer. They also investigate the open research issues and emerging technologies on security in WSNs. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IGI Global | en_US |
dc.relation.ispartof | Theory and Practice of Cryptography Solutions for Secure Information Systems | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Network security | en_US |
dc.subject | Sensor nodes | en_US |
dc.subject | Surveys | en_US |
dc.subject | Attack detection | en_US |
dc.subject | Defense mechanism | en_US |
dc.subject | Emerging technologies | en_US |
dc.subject | Hardware and software components | en_US |
dc.subject | Protocol layers | en_US |
dc.subject | Research issues | en_US |
dc.subject | Security in wireless sensor networks | en_US |
dc.subject | Sensing areas | en_US |
dc.subject | Wireless sensor networks | en_US |
dc.title | A survey on security in wireless sensor networks: Attacks and defense mechanisms | en_US |
dc.type | Book Part | en_US |
dc.identifier.doi | 10.4018/978-1-4666-4030-6.ch010 | - |
dc.identifier.scopus | 2-s2.0-84944755221 | en_US |
dc.authorscopusid | 25641368900 | - |
dc.authorscopusid | 35175250700 | - |
dc.authorscopusid | 35299050800 | - |
dc.identifier.startpage | 223 | en_US |
dc.identifier.endpage | 251 | en_US |
dc.relation.publicationcategory | Kitap Bölümü - Uluslararası | en_US |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosquality | N/A | - |
item.grantfulltext | reserved | - |
item.openairetype | Book Part | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.cerifentitytype | Publications | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
3774.pdf Restricted Access | 1.11 MB | Adobe PDF | View/Open Request a copy |
CORE Recommender
SCOPUSTM
Citations
2
checked on Nov 20, 2024
Page view(s)
74
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.