WSN is formed by autonomous nodes with partial memory, communication range, power, and bandwidth.
Their occupation depends on inspecting corporal and environmental conditions and communing through a
system and performing data processing. The application field is vast, comprising military, ecology,
healthcare, home or commercial and require a highly secured communication. The paper analyses different
types of attacks and counterattacks and provides solutions for the WSN threats.
%0 Journal Article
%1 noauthororeditor
%A Fatema, Nusrat
%A Brad, Remus
%D 2013
%J International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)
%K Attacks Counterattacks and network sensor wireless
%N 6
%P 15
%R 10.5121/ijasuc.2013.4601
%T Attacks and Counterattacks on Wireless Sensor Networks
%U http://aircconline.com/ijasuc/V4N6/4613ijasuc01.pdf
%V 4
%X WSN is formed by autonomous nodes with partial memory, communication range, power, and bandwidth.
Their occupation depends on inspecting corporal and environmental conditions and communing through a
system and performing data processing. The application field is vast, comprising military, ecology,
healthcare, home or commercial and require a highly secured communication. The paper analyses different
types of attacks and counterattacks and provides solutions for the WSN threats.
@article{noauthororeditor,
abstract = {WSN is formed by autonomous nodes with partial memory, communication range, power, and bandwidth.
Their occupation depends on inspecting corporal and environmental conditions and communing through a
system and performing data processing. The application field is vast, comprising military, ecology,
healthcare, home or commercial and require a highly secured communication. The paper analyses different
types of attacks and counterattacks and provides solutions for the WSN threats. },
added-at = {2018-02-09T02:05:55.000+0100},
author = {Fatema, Nusrat and Brad, Remus},
biburl = {https://www.bibsonomy.org/bibtex/20b0105fd3f3688dbcad6a99daaeb91ee/usmankhawaja},
doi = {10.5121/ijasuc.2013.4601},
interhash = {0c0de58272007c1349f21cb6267cf50a},
intrahash = {0b0105fd3f3688dbcad6a99daaeb91ee},
issn = {0976 - 1764},
journal = {International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC)},
keywords = {Attacks Counterattacks and network sensor wireless},
language = {English},
month = {December},
number = 6,
pages = 15,
timestamp = {2018-02-09T02:05:55.000+0100},
title = {Attacks and Counterattacks on Wireless Sensor Networks},
url = {http://aircconline.com/ijasuc/V4N6/4613ijasuc01.pdf},
volume = 4,
year = 2013
}