Please use this identifier to cite or link to this item:
|Title||Types of Attacks Penetrating Wireless Sensor Networks And Strategies to Overcome Them|
|Title in Arabic||Types of Attacks Penetrating Wireless Sensor Networks And Strategies to Overcome Them|
Like many other technologies on military and defense working on sensor networks to be started. During the Cold War, the USA’s government started to sponsor the project called Sound Surveillance System. In that project the US Army trying to intrusion detection and tracking of Soviet submarines by placing a number of sensors at the strategic points under the ocean. Working on the Sensor networks project are actively started in the Defense Advanced Research Projects Agency of America since 1980 and via the distributed sensor networks project. Most of the Sensors are working with the chemical energy of a battery. Sensors can be used to intervene and penetrate to the networks. This article focuses on the methods of attack, and strategies of overcoming them.
|Published in||The Fifth International Conference on Engineering and Sustainability (ICES5)|
|Publisher||The Islamic University of Gaza|
|Files in this item|