Please use this identifier to cite or link to this item:
http://localhost:80/xmlui/handle/123456789/7487Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Saha, Shilpi | - |
| dc.date.accessioned | 2023-04-05T11:01:29Z | - |
| dc.date.available | 2023-04-05T11:01:29Z | - |
| dc.date.issued | 2010 | - |
| dc.identifier.uri | http://172.16.0.4:8085/heritage/handle/123456789/7487 | - |
| dc.description.abstract | The security in wireless sensor networks (WSNs) is a critical issue due to the inherent limitations of computational capacity and power usage. While a variety of security techniques are being developed and a lot of research is going on in security field at a brisk pace but the fields lacks a common integrated platform which provides a comprehensive comparison of the seemingly unconnected but linked issues. In this paper, we have tried to analyze some attacks and their possible countermeasures in OSI layered manner. | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Springer | en_US |
| dc.relation.ispartofseries | Vol : 123; | - |
| dc.subject | WSN | en_US |
| dc.subject | security | en_US |
| dc.subject | Sybil | en_US |
| dc.subject | wormhole | en_US |
| dc.subject | spoofing | en_US |
| dc.subject | eavesdropping | en_US |
| dc.subject | selective forwarding | en_US |
| dc.title | OSI Layer Wise Security Analysis of Wireless Sensor Network | en_US |
| dc.title.alternative | (In) Signal Processing and Multimedia | en_US |
| dc.type | Other | en_US |
| Appears in Collections: | Computer Science And Engineering (Publications) | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 978-3-642-17641-8_33.pdf | 135.33 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.