Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.14365/3774
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKorkmaz I.-
dc.contributor.authorDagdeviren O.-
dc.contributor.authorTekbacak F.-
dc.contributor.authorDalkilic M.E.-
dc.date.accessioned2023-06-16T15:03:12Z-
dc.date.available2023-06-16T15:03:12Z-
dc.date.issued2013-
dc.identifier.isbn9781466640313-
dc.identifier.isbn1466640308-
dc.identifier.isbn9781466640306-
dc.identifier.urihttps://doi.org/10.4018/978-1-4666-4030-6.ch010-
dc.identifier.urihttps://hdl.handle.net/20.500.14365/3774-
dc.description.abstractWireless Sensor Network (WSN) is a promising technology that has attracted the interest of research in the last decade. Security is one of the fundamental issues in sensor networks since sensor nodes are very resource constrained. An attacker may modify, insert, and delete new hardware and software components to the system where a single node, a specific part of the sensing area, and the whole network may become inoperable. Thus, the design of early attack detection and defense mechanisms must be carefully considered. In this chapter, the authors survey attacks and their defense mechanisms in WSNs. Attacks are categorized according to the related protocol layer. They also investigate the open research issues and emerging technologies on security in WSNs.en_US
dc.language.isoenen_US
dc.publisherIGI Globalen_US
dc.relation.ispartofTheory and Practice of Cryptography Solutions for Secure Information Systemsen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectNetwork securityen_US
dc.subjectSensor nodesen_US
dc.subjectSurveysen_US
dc.subjectAttack detectionen_US
dc.subjectDefense mechanismen_US
dc.subjectEmerging technologiesen_US
dc.subjectHardware and software componentsen_US
dc.subjectProtocol layersen_US
dc.subjectResearch issuesen_US
dc.subjectSecurity in wireless sensor networksen_US
dc.subjectSensing areasen_US
dc.subjectWireless sensor networksen_US
dc.titleA survey on security in wireless sensor networks: Attacks and defense mechanismsen_US
dc.typeBook Parten_US
dc.identifier.doi10.4018/978-1-4666-4030-6.ch010-
dc.identifier.scopus2-s2.0-84944755221en_US
dc.authorscopusid25641368900-
dc.authorscopusid35175250700-
dc.authorscopusid35299050800-
dc.identifier.startpage223en_US
dc.identifier.endpage251en_US
dc.relation.publicationcategoryKitap Bölümü - Uluslararasıen_US
dc.identifier.scopusqualityN/A-
dc.identifier.wosqualityN/A-
item.grantfulltextreserved-
item.openairetypeBook Part-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.fulltextWith Fulltext-
item.languageiso639-1en-
item.cerifentitytypePublications-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Files in This Item:
File SizeFormat 
3774.pdf
  Restricted Access
1.11 MBAdobe PDFView/Open    Request a copy
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

2
checked on Nov 20, 2024

Page view(s)

74
checked on Nov 18, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.