dc.contributor.author | Μπιτζιόπουλος, Αριστείδης | el |
dc.contributor.author | Γαβαλάς, Δαμιανός | el |
dc.contributor.author | Πάντζιου, Γραμματή Ε. | el |
dc.contributor.author | Κωνσταντόπουλος, Χαράλαμπος | el |
dc.date.accessioned | 2015-05-26T22:58:08Z | |
dc.date.issued | 2015-05-27 | |
dc.identifier.uri | http://hdl.handle.net/11400/11216 | |
dc.rights | Αναφορά Δημιουργού-Μη Εμπορική Χρήση-Όχι Παράγωγα Έργα 3.0 Ηνωμένες Πολιτείες | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/us/ | * |
dc.source | http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=4394775 | en |
dc.subject | εμπόδιο | |
dc.subject | κωδικός ψευδοθορύβου | |
dc.subject | εύρος φάσματος επικοινωνίας | |
dc.subject | ασφάλεια τηλεπικοινωνιών | |
dc.subject | ασύρματα δίκτυα αισθητήρων | |
dc.subject | jamming | |
dc.subject | pseudonoise codes | |
dc.subject | spread spectrum communication | |
dc.subject | Telecommunication--Security measures | |
dc.subject | Wireless sensor networks | |
dc.title | Defending wireless sensor networks from jamming attacks | en |
heal.type | conferenceItem | |
heal.classification | Τεχνολογία | |
heal.classification | Πληροφορική | |
heal.classification | Technology | |
heal.classification | Computer science | |
heal.classificationURI | **N/A**-Τεχνολογία | |
heal.classificationURI | **N/A**-Πληροφορική | |
heal.classificationURI | http://id.loc.gov/authorities/subjects/sh85133147 | |
heal.classificationURI | http://skos.um.es/unescothes/C00750 | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh85133285 | |
heal.keywordURI | http://id.loc.gov/authorities/subjects/sh2008004547 | |
heal.identifier.secondary | DOI: 10.1109/PIMRC.2007.4394775 | |
heal.dateAvailable | 10000-01-01 | |
heal.language | en | |
heal.access | forever | |
heal.recordProvider | Τεχνολογικό Εκπαιδευτικό Ίδρυμα Αθήνας. Σχολή Τεχνολογικών Εφαρμογών. Τμήμα Μηχανικών Πληροφορικής Τ.Ε. | el |
heal.publicationDate | 2007-09-03 | |
heal.bibliographicCitation | Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C. and Pantziou, G. (2007) Defending Wireless Sensor Networks from Jamming Attacks. Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’2007). Athens: IEEE | en |
heal.abstract | Wireless sensor networks (WSNs) are used in many applications which often include the monitoring and recording of sensitive information. Hence, their critical importance raises many security concerns. In the context of WSNs, jamming is the type of attack which interferes with the radio frequencies used by network nodes. In the event that an attacker uses a rather powerful jamming source, disruptions of WSNs proper function are likely to occur. As a result, the use of countermeasures against jamming in WSN environments is of immense importance. The main contribution of this article is the discussion of various defence methods against jamming that would allow a WSN to survive and work properly in a hostile jamming environment. Our focus is on frequency hopping spread spectrum (FHSS) and direct sequence spread spectrum (DSSS), two of the most effective countermeasures against jamming. We suggest the use of a specific FHSS technique in 5 GHz band with 55 frequency channels wherein the channel sequence is generated using a secret word, known only to the sink and the sensor nodes, as a seed. Each channel uses DSSS modulation with 16 bit Pseudo Noise (PN) code, which derives from the same secret word used for FHSS channel generation. | en |
heal.publisher | IEEE | en |
heal.fullTextAvailability | false | |
heal.conferenceName | Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’2007) | en |
heal.conferenceItemType | short paper |
Αρχεία | Μέγεθος | Μορφότυπο | Προβολή |
---|---|---|---|
Δεν υπάρχουν αρχεία που σχετίζονται με αυτό το τεκμήριο. |
Οι παρακάτω άδειες σχετίζονται με αυτό το τεκμήριο: