Taxonomy of attacks on wireless sensor networks
dc.contributor.author | Han, Song | |
dc.contributor.author | Chang, Elizabeth | |
dc.contributor.author | Gao, L. | |
dc.contributor.author | Dillon, Tharam S. | |
dc.date.accessioned | 2017-01-30T11:38:01Z | |
dc.date.available | 2017-01-30T11:38:01Z | |
dc.date.created | 2008-11-12T23:25:26Z | |
dc.date.issued | 2005 | |
dc.identifier.citation | Han, Song and Chang, Elizabeth and Gao, Li and Dillon, Tharam. 2005. : Taxonomy of attacks on wireless sensor networks, in Blyth, A. (ed), First European Conference on Computer Network Defence (EC2ND), Dec 15 2005, pp. 97-105. Glamorgan, UK: Springer-Verlag. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/13580 | |
dc.identifier.doi | 10.1007/1-84628-352-3_10 | |
dc.description.abstract |
Along with sensor networks popularly utilized in the practical applications, to design optimistic security mechanisms is becoming a big challenge within the wireless sensor networks. As a result, it is imperative to propose a taxonomy of attacks on wireless sensor networks, since good security mechanism should address the attacks on wireless sensor networks. This paper presents the first work of the taxonomy of attacks on wireless sensor networks in a systematic way. This will help researchers in the area of wireless sensor networks to better understand wireless sensor network security and design more optimistic security countermeasures for wireless sensor networks. | |
dc.publisher | Springer-Verlag | |
dc.relation.uri | http://www.springerlink.com/content/h51q706064p6x30j/ | |
dc.subject | wireless | |
dc.subject | taxonomy of attacks | |
dc.subject | information systems | |
dc.subject | security | |
dc.subject | wireless sensor networks | |
dc.title | Taxonomy of attacks on wireless sensor networks | |
dc.type | Conference Paper | |
dcterms.source.startPage | 97 | |
dcterms.source.endPage | 105 | |
dcterms.source.title | Proceedings of the First European Conference on Computer Network Defence (EC2ND) | |
dcterms.source.series | Proceedings of the First European Conference on Computer Network Defence (EC2ND) | |
dcterms.source.conference | First European Conference on Computer Network Defence (EC2ND) | |
dcterms.source.conference-start-date | Dec 15 2005 | |
dcterms.source.conferencelocation | Glamorgan, UK | |
dcterms.source.place | London, UK | |
curtin.note |
EC2ND 2005 | |
curtin.note |
Proceedings of the First European Conference on Computer Network Defence | |
curtin.note |
School of Computing, University of Glamorgan, Wales UK | |
curtin.note |
Blyth, Andrew (Ed.) 2006, IX, 296 p. 123 illus., Softcover | |
curtin.note |
ISBN: 978-1-84628-311-6 | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | EPR-738 | |
curtin.accessStatus | Fulltext not available | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |