Recognizing attacks in wireless sensor network in view of internet of things

DP Acharjya, NSS Ahmed - Internet of things: Novel advances and …, 2017 - Springer
Internet of things: Novel advances and envisioned applications, 2017Springer
Wireless sensor networks are wide spreading, dominating, and has a far-reaching range of
utilizations such as battlefield scrutiny, traffic scrutiny, forest fire detection, flood detection
etc. Both industry and academia are targeting their research works for the sake of advancing
their functions. The safety of a wireless sensor network is negotiated due to the random
distribution of sensor nodes in exposed environment, memory restraints, power restraints
and unattended nature. Furthermore, providing confidence between every couple of …
Abstract
Wireless sensor networks are wide spreading, dominating, and has a far-reaching range of utilizations such as battlefield scrutiny, traffic scrutiny, forest fire detection, flood detection etc. Both industry and academia are targeting their research works for the sake of advancing their functions. The safety of a wireless sensor network is negotiated due to the random distribution of sensor nodes in exposed environment, memory restraints, power restraints and unattended nature. Furthermore, providing confidence between every couple of communicating nodes is a demanding issue and is of prime importance in internet of things. Under these conditions this chapter spotlights variety of attacks and their symptoms thoroughly. The chapter analyzes them based on trusting based protection techniques including classical techniques such as fuzzy, Bayesian, game theory etc. Modern techniques such as clustering, bio-inspired computing, key establishment based techniques are stressed upon to provide maximum protection for each node in the wireless sensor network.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果

Google学术搜索按钮

example.edu/paper.pdf
搜索
获取 PDF 文件
引用
References