Please use this identifier to cite or link to this item:
http://localhost:80/xmlui/handle/123456789/7487
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Saha, Shilpi | - |
dc.date.accessioned | 2023-04-05T11:01:29Z | - |
dc.date.available | 2023-04-05T11:01:29Z | - |
dc.date.issued | 2010 | - |
dc.identifier.uri | http://172.16.0.4:8085/heritage/handle/123456789/7487 | - |
dc.description.abstract | The security in wireless sensor networks (WSNs) is a critical issue due to the inherent limitations of computational capacity and power usage. While a variety of security techniques are being developed and a lot of research is going on in security field at a brisk pace but the fields lacks a common integrated platform which provides a comprehensive comparison of the seemingly unconnected but linked issues. In this paper, we have tried to analyze some attacks and their possible countermeasures in OSI layered manner. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer | en_US |
dc.relation.ispartofseries | Vol : 123; | - |
dc.subject | WSN | en_US |
dc.subject | security | en_US |
dc.subject | Sybil | en_US |
dc.subject | wormhole | en_US |
dc.subject | spoofing | en_US |
dc.subject | eavesdropping | en_US |
dc.subject | selective forwarding | en_US |
dc.title | OSI Layer Wise Security Analysis of Wireless Sensor Network | en_US |
dc.title.alternative | (In) Signal Processing and Multimedia | en_US |
dc.type | Other | en_US |
Appears in Collections: | Computer Science And Engineering (Publications) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
978-3-642-17641-8_33.pdf | 135.33 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.