dc.contributor.author | Μπιτζιόπουλος, Αριστείδης | el |
dc.contributor.author | Γαβαλάς, Δαμιανός | el |
dc.contributor.author | Πάντζιου, Γραμματή Ε. | el |
dc.contributor.author | Κωνσταντόπουλος, Χαράλαμπος | el |
dc.date.accessioned | 2015-05-23T17:09:54Z | |
dc.date.issued | 2015-05-23 | |
dc.identifier.uri | http://hdl.handle.net/11400/11007 | |
dc.rights | Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ηνωμένες Πολιτείες | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.source | http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5343062&abstractAccess=no&userType=inst | en |
dc.subject | πρωτόκολλα | |
dc.subject | ασφάλεια τηλεπικοινωνιών | |
dc.subject | ασύρματα δίκτυα αισθητήρων | |
dc.subject | protocols | |
dc.subject | Telecommunication--Security measures | |
dc.subject | Wireless sensor networks | |
dc.title | A survey on jamming attacks and countermeasures in WSNs | en |
heal.type | journalArticle | |
heal.classification | Τεχνολογία | |
heal.classification | Πληροφορική | |
heal.classification | Technology | |
heal.classification | Computer science | |
heal.classificationURI | **N/A**-Τεχνολογία | |
heal.classificationURI | **N/A**-Πληροφορική | |
heal.classificationURI | http://id.loc.gov/authorities/subjects/sh85133147 | |
heal.classificationURI | http://skos.um.es/unescothes/C00750 | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh85133285 | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh2008004547 | |
heal.identifier.secondary | DOI: 10.1109/SURV.2009.090404 | |
heal.dateAvailable | 10000-01-01 | |
heal.language | en | |
heal.access | forever | |
heal.recordProvider | Τεχνολογικό Εκπαιδευτικό Ίδρυμα Αθήνας. Σχολή Τεχνολογικών Εφαρμογών. Τμήμα Μηχανικών Πληροφορικής Τ.Ε. | el |
heal.publicationDate | 2009-10 | |
heal.bibliographicCitation | Mpitziopoulos, A., Gavalas, D., Pantziou, G. and Konstantopoulos, C. (2009) A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys and Tutorials. [Online] 11 (4). pp.42-56. Available from: http://ieeexplore.ieee.org [Accessed 23/05/2015] | en |
heal.abstract | Jamming represents the most serious security threat in the field of wireless sensor networks (WSNs), as it can easily put out of order even WSNs that utilize strong highlayer security mechanisms, simply because it is often ignored in the initial WSN design. The objective of this article is to provide a general overview of the critical issue of jamming in WSNs and cover all the relevant work, providing the interested researcher pointers for open research issues in this field. We provide a brief overview of the communication protocols typically used in WSN deployments and highlight the characteristics of contemporary WSNs, that make them susceptible to jamming attacks, along with the various types of jamming which can be exercised against WSNs. Common jamming techniques and an overview of various types of jammers are reviewed and typical countermeasures against jamming are also analyzed. The key ideas of existing security mechanisms against jamming attacks in WSNs are presented and open research issues, with respect to the defense against jamming attacks are highlighted. | en |
heal.sponsor | IEEE Communications Society | en |
heal.publisher | IEEE | en |
heal.journalName | IEEE Communications Surveys and Tutorials | en |
heal.journalType | peer-reviewed | |
heal.fullTextAvailability | false |
Αρχεία | Μέγεθος | Μορφότυπο | Προβολή |
---|---|---|---|
Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο. |
Οι παρακάτω άδειες σχετίζονται με αυτό το τεκμήριο: