Attacks and Counterattacks on Wireless Sensor Networks
, and .
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) 4 (6): 15 (December 2013)

WSN is formed by autonomous nodes with partial memory, communication range, power, and bandwidth. Their occupation depends on inspecting corporal and environmental conditions and communing through a system and performing data processing. The application field is vast, comprising military, ecology, healthcare, home or commercial and require a highly secured communication. The paper analyses different types of attacks and counterattacks and provides solutions for the WSN threats.
  • @usmankhawaja
This publication has not been reviewed yet.

rating distribution
average user rating0.0 out of 5.0 based on 0 reviews
    Please log in to take part in the discussion (add own reviews or comments).