Attacks and Countermeasures in Sensor Networks: A Survey

Abstract

2 Physical Layer 3 2.1 Attacks in the Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.1 Device Tampering . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.2 Eavesdropping . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.3 Jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Countermeasures in the Physical Layer . . . . . . . . . . . . . . . . . . . 5 2.2.1 Access Restriction . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2.2 Encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

3 Figures and Tables

010202008200920102011201220132014201520162017
Citations per Year

59 Citations

Semantic Scholar estimates that this publication has 59 citations based on the available data.

See our FAQ for additional information.

Cite this paper

@inproceedings{Huang2005AttacksAC, title={Attacks and Countermeasures in Sensor Networks: A Survey}, author={Scott C.-H. Huang and David MacCallum and Kai Xing and Manny Rivera and Jiang Li and Xiuzhen Cheng}, year={2005} }