Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/9777
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Korkmaz, İlker | tr |
dc.contributor.author | Dağdeviren, Orhan | tr |
dc.contributor.author | Tekbacak, Fatih | - |
dc.contributor.author | Dalkılıç, Mehmet Emin | - |
dc.date.accessioned | 2021-01-24T18:28:30Z | - |
dc.date.available | 2021-01-24T18:28:30Z | - |
dc.date.issued | 2013 | - |
dc.identifier.isbn | 9781466640313 | - |
dc.identifier.isbn | 1466640308 | - |
dc.identifier.isbn | 9781466640306 | - |
dc.identifier.uri | https://doi.org/10.4018/978-1-4666-4030-6.ch010 | - |
dc.identifier.uri | https://hdl.handle.net/11147/9777 | - |
dc.description.abstract | Wireless Sensor Network (WSN) is a promising technology that has attracted the interest of research in the last decade. Security is one of the fundamental issues in sensor networks since sensor nodes are very resource constrained. An attacker may modify, insert, and delete new hardware and software components to the system where a single node, a specific part of the sensing area, and the whole network may become inoperable. Thus, the design of early attack detection and defense mechanisms must be carefully considered. In this chapter, the authors survey attacks and their defense mechanisms in WSNs. Attacks are categorized according to the related protocol layer. They also investigate the open research issues and emerging technologies on security in WSNs. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IGI Global | en_US |
dc.relation.ispartof | Theory and Practice of Cryptography Solutions for Secure Information Systems | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.title | A survey on security in wireless sensor networks: Attacks and defense mechanisms | en_US |
dc.type | Book Part | en_US |
dc.institutionauthor | Tekbacak, Fatih | tr |
dc.department | İzmir Institute of Technology. Computer Engineering | en_US |
dc.identifier.startpage | 223 | en_US |
dc.identifier.endpage | 251 | en_US |
dc.identifier.scopus | 2-s2.0-84944755221 | en_US |
dc.relation.publicationcategory | Kitap Bölümü - Uluslararası | en_US |
dc.identifier.doi | 10.4018/978-1-4666-4030-6.ch010 | - |
dc.relation.doi | 10.4018/978-1-4666-4030-6.ch010 | en_US |
dc.coverage.doi | 10.4018/978-1-4666-4030-6.ch010 | en_US |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | N/A | - |
item.fulltext | No Fulltext | - |
item.grantfulltext | none | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Book Part | - |
crisitem.author.dept | 03.04. Department of Computer Engineering | - |
Appears in Collections: | Computer Engineering / Bilgisayar Mühendisliği Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
2
checked on Nov 15, 2024
Page view(s)
204
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.