Show simple item record

dc.contributor.advisorKosbar, Kurten_US
dc.contributor.authorKulkarni, Aditya
dc.date.accessioned2015-10-14T16:30:12Zen
dc.date.available2015-10-14T16:30:12Zen
dc.date.issued2013-10en
dc.identifier.issn0884-5123en
dc.identifier.issn0074-9079en
dc.identifier.urihttp://hdl.handle.net/10150/579643en
dc.descriptionITC/USA 2013 Conference Proceedings / The Forty-Ninth Annual International Telemetering Conference and Technical Exhibition / October 21-24, 2013 / Bally's Hotel & Convention Center, Las Vegas, NVen_US
dc.description.abstractThis paper describes some of the security challenges faced by Wireless Sensor Networks (WSN). A classification and analysis of prominent attacks on the routing protocols of WSN is provided, along with a review of recent developments in the field to help mitigate the impact of these attacks.
dc.description.sponsorshipInternational Foundation for Telemeteringen
dc.language.isoen_USen
dc.publisherInternational Foundation for Telemeteringen
dc.relation.urlhttp://www.telemetry.org/en
dc.rightsCopyright © held by the author; distribution rights International Foundation for Telemeteringen_US
dc.subjectwireless sensor networksen
dc.subjectroutineen
dc.subjectsecure communicationsen
dc.titleStudy on Routing Protocols for the Security of Wireless Sensor Networksen_US
dc.typetexten
dc.typeProceedingsen
dc.contributor.departmentMissouri University of Science and Technologyen
dc.identifier.journalInternational Telemetering Conference Proceedingsen
dc.description.collectioninformationProceedings from the International Telemetering Conference are made available by the International Foundation for Telemetering and the University of Arizona Libraries. Visit http://www.telemetry.org/index.php/contact-us if you have questions about items in this collection.en_US
refterms.dateFOA2018-06-15T12:35:40Z
html.description.abstractThis paper describes some of the security challenges faced by Wireless Sensor Networks (WSN). A classification and analysis of prominent attacks on the routing protocols of WSN is provided, along with a review of recent developments in the field to help mitigate the impact of these attacks.


Files in this item

Thumbnail
Name:
ITC_2013_13-08-03.pdf
Size:
97.01Kb
Format:
PDF

This item appears in the following Collection(s)

Show simple item record