|
Volumn 2, Issue , 2010, Pages 96-99
|
The analysis for the attack on the wireless bridge monitoring system
|
Author keywords
Monitoring system; Wireless sensor network; Zigbee
|
Indexed keywords
3G MOBILE;
BACK-END SERVERS;
BRIDGE MONITORING;
DENIAL OF SERVICE ATTACKS;
ENVIRONMENTAL FACTORS;
GATEWAY NODES;
LABOR COSTS;
MONITORING SYSTEM;
NS-2 SIMULATIONS;
QUEUE MANAGEMENT;
REMOTE AREAS;
VARIOUS ATTACKS;
WIRELESS BRIDGES;
WIRELESS SENSOR;
WIRELESS SENSOR SYSTEM;
ZIG-BEE;
BRIDGES;
CIVIL ENGINEERING;
COMPUTER CRIME;
COMPUTER SIMULATION;
COST ACCOUNTING;
COST REDUCTION;
EMPLOYMENT;
GATEWAYS (COMPUTER NETWORKS);
INFORMATION TECHNOLOGY;
MOBILE PHONES;
SECURITY OF DATA;
SENSOR NETWORKS;
SERVERS;
TELECOMMUNICATION EQUIPMENT;
TELEPHONE SYSTEMS;
WAGES;
MONITORING;
|
EID: 77954292003
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/MMIT.2010.154 Document Type: Conference Paper |
Times cited : (1)
|
References (9)
|