Attacks in wireless sensor networks

dc.contributor.authorKibirige, George William
dc.contributor.authorSanga, Camilius A.
dc.date.accessioned2023-03-29T05:58:51Z
dc.date.available2023-03-29T05:58:51Z
dc.date.issued2016
dc.descriptionArticleen_US
dc.description.abstractWireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their charac- teristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.en_US
dc.identifier.urihttp://www.suaire.sua.ac.tz/handle/123456789/5125
dc.language.isoenen_US
dc.publisherIGI Globalen_US
dc.subjectWirelessen_US
dc.subjectSensor networksen_US
dc.titleAttacks in wireless sensor networksen_US
dc.typeArticleen_US
dc.urlDOI: 10.4018/978-1-4666-8761-5.ch005en_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
KIBIRIGE 3.pdf
Size:
107.95 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.67 KB
Format:
Item-specific license agreed upon to submission
Description: