The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2011
DOI: 10.5121/ijp2p.2011.2203
|View full text |Cite
|
Sign up to set email alerts
|

A Comparison of Physical Attacks on Wireless Sensor Networks

Abstract: Wireless sensor networks (WSNs) have many potential applications [1,5]

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 24 publications
(24 citation statements)
references
References 11 publications
(18 reference statements)
0
24
0
Order By: Relevance
“…Which leads to serious consequences, such as launching other attacks (the hole, the black hole), and extract sensitive information WSN, delete and protect privacy and limit data confidentiality [11].…”
Section: Military Applicationsmentioning
confidence: 99%
See 4 more Smart Citations
“…Which leads to serious consequences, such as launching other attacks (the hole, the black hole), and extract sensitive information WSN, delete and protect privacy and limit data confidentiality [11].…”
Section: Military Applicationsmentioning
confidence: 99%
“…Which prompts to Packets confusion, flooding its system connection, and wrong routing tables (false routing data). [11] Rushing Attack: In this kind of assault a fast communicate the bogus advertisings of route demand through the WSN [64]. An aggressor abuses copy concealment in communicates to smother real packet by rapidly sending its own packets.…”
Section: Looping (Vampire Attack)mentioning
confidence: 99%
See 3 more Smart Citations