Please use this identifier to cite or link to this item:
https://rfos.fon.bg.ac.rs/handle/123456789/1807Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.creator | Gavrić, Željko | |
| dc.creator | Simić, Dejan | |
| dc.date.accessioned | 2023-05-12T11:15:08Z | - |
| dc.date.available | 2023-05-12T11:15:08Z | - |
| dc.date.issued | 2018 | |
| dc.identifier.issn | 0120-5609 | |
| dc.identifier.uri | https://rfos.fon.bg.ac.rs/handle/123456789/1807 | - |
| dc.description.abstract | Wireless sensor networks are now used in various fields. The information transmitted in the wireless sensor networks is very sensitive, so the security issue is very important. DOS (denial of service) attacks are a fundamental threat to the functioning of wireless sensor networks. This paper describes some of the most common DOS attacks and potential methods of protection against them. The case study shows one of the most frequent attacks on wireless sensor networks - the interference attack. In the introduction of this paper authors assume that the attack interference can cause significant obstruction of wireless sensor networks. This assumption has been proved in the case study through simulation scenario and simulation results. | en |
| dc.publisher | Univ Nac Colombia, Fac Ingenieria, Bogota | |
| dc.rights | openAccess | |
| dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
| dc.source | Ingenieria E Investigacion | |
| dc.subject | Wireless Sensor Networks | en |
| dc.subject | Wireless communication | en |
| dc.subject | Radiofrequency interference | en |
| dc.subject | Intrusion detection | en |
| dc.subject | Communication system security | en |
| dc.title | Overview of DOS attacks on wireless sensor networks and experimental results for simulation of interference attacks | en |
| dc.type | article | |
| dc.rights.license | BY | |
| dc.citation.epage | 138 | |
| dc.citation.issue | 1 | |
| dc.citation.other | 38(1): 130-138 | |
| dc.citation.rank | M23 | |
| dc.citation.spage | 130 | |
| dc.citation.volume | 38 | |
| dc.identifier.doi | 10.15446/ing.investig.v38n1.65453 | |
| dc.identifier.fulltext | http://prototype2.rcub.bg.ac.rs/bitstream/id/488/1803.pdf | |
| dc.identifier.rcub | conv_2100 | |
| dc.identifier.scopus | 2-s2.0-85045978061 | |
| dc.identifier.wos | 000444653900016 | |
| dc.type.version | publishedVersion | |
| item.cerifentitytype | Publications | - |
| item.fulltext | With Fulltext | - |
| item.grantfulltext | open | - |
| item.openairetype | article | - |
| item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
| Appears in Collections: | Radovi istraživača / Researchers’ publications | |
This item is licensed under a Creative Commons License
