원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Over the first few years, a wireless sensor network has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. Wormhole attack is one of the severe attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and focuses on some different technique to detecting wormhole attacks in wireless sensor networks.
목차
Abstract
1. Introduction
2. Intrusion Detection Systems
3. Wormhole Attack
3.1 Types of Wormhole Attack
3.2 Routing Protocols for Wormhole Attack
4. Detection Approaches of the Wormhole Attack
5. Conclusion
References
1. Introduction
2. Intrusion Detection Systems
3. Wormhole Attack
3.1 Types of Wormhole Attack
3.2 Routing Protocols for Wormhole Attack
4. Detection Approaches of the Wormhole Attack
5. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보
