Please use this identifier to cite or link to this item: http://hdl.handle.net/10553/74435
DC FieldValueLanguage
dc.contributor.authorCanovas, Alejandroen_US
dc.contributor.authorLloret, Jaimeen_US
dc.contributor.authorMacias-López, Elsaen_US
dc.contributor.authorSuárez Sarmiento, Álvaroen_US
dc.date.accessioned2020-09-16T09:44:09Z-
dc.date.available2020-09-16T09:44:09Z-
dc.date.issued2014en_US
dc.identifier.issn1550-1329en_US
dc.identifier.otherScopus-
dc.identifier.otherWoS-
dc.identifier.urihttp://hdl.handle.net/10553/74435-
dc.description.abstractWireless sensor networks (WSNs) are currently widely used in many environments. Some of them gather many critical data, which should be protected from intruders. Generally, when an intruder is detected in the WSN, its connection is immediately stopped. But this way does not let the network administrator gather information about the attacker and/or its purposes. In this paper, we present a bioinspired system that uses the procedure taken by the web spider when it wants to catch its prey. We will explain how all steps performed by the web spider are included in our system and we will detail the algorithm and protocol procedure. A real test bench has been implemented in order to validate our system. It shows the performance for different response times, the CPU and RAM consumption, and the average and maximum values for ping and tracert time responses using constant delay and exponential jitter.en_US
dc.languageengen_US
dc.relation.ispartofInternational Journal of Distributed Sensor Networksen_US
dc.sourceInternational Journal of Distributed Sensor Networks [ISSN 1550-1329], v. 2014, Article ID 348606, (Enero 2014)en_US
dc.subject3325 Tecnología de las telecomunicacionesen_US
dc.subject.otherWireless Sensor Networksen_US
dc.subject.otherWeb Spider Securityen_US
dc.titleWeb Spider Defense Technique in Wireless Sensor Networksen_US
dc.typeinfo:eu-repo/semantics/Articleen_US
dc.typeArticleen_US
dc.identifier.doi10.1155/2014/348606en_US
dc.identifier.scopus84934993691-
dc.identifier.isi000340179400001-
dc.contributor.authorscopusid27867572900-
dc.contributor.authorscopusid23389476400-
dc.contributor.authorscopusid7005482663-
dc.contributor.authorscopusid7202765632-
dc.identifier.eissn1550-1477-
dc.relation.volume2014en_US
dc.investigacionIngeniería y Arquitecturaen_US
dc.type2Artículoen_US
dc.contributor.daisngid2145741-
dc.contributor.daisngid59484-
dc.contributor.daisngid4166170-
dc.contributor.daisngid13818906-
dc.description.numberofpages7en_US
dc.utils.revisionen_US
dc.contributor.wosstandardWOS:Canovas, A-
dc.contributor.wosstandardWOS:Lloret, J-
dc.contributor.wosstandardWOS:Macias, E-
dc.contributor.wosstandardWOS:Suarez, A-
dc.date.coverdateEnero 2014en_US
dc.identifier.ulpgces
dc.description.sjr0,244
dc.description.jcr0,665
dc.description.sjrqQ2
dc.description.jcrqQ4
dc.description.scieSCIE
item.grantfulltextopen-
item.fulltextCon texto completo-
crisitem.author.deptGIR IUCES: Arquitectura y Concurrencia-
crisitem.author.deptIU de Cibernética, Empresa y Sociedad (IUCES)-
crisitem.author.deptDepartamento de Ingeniería Telemática-
crisitem.author.deptGIR IUCES: Arquitectura y Concurrencia-
crisitem.author.deptIU de Cibernética, Empresa y Sociedad (IUCES)-
crisitem.author.deptDepartamento de Ingeniería Telemática-
crisitem.author.orcid0000-0002-9085-8398-
crisitem.author.orcid0000-0002-3043-7161-
crisitem.author.parentorgIU de Cibernética, Empresa y Sociedad (IUCES)-
crisitem.author.parentorgIU de Cibernética, Empresa y Sociedad (IUCES)-
crisitem.author.fullNameMacías López, Elsa María-
crisitem.author.fullNameSuárez Sarmiento, Álvaro-
Appears in Collections:Artículos
Unknown (1,77 MB)
Show simple item record

SCOPUSTM   
Citations

9
checked on Oct 13, 2024

WEB OF SCIENCETM
Citations

7
checked on Oct 13, 2024

Page view(s)

131
checked on Feb 10, 2024

Download(s)

107
checked on Feb 10, 2024

Google ScholarTM

Check

Altmetric


Share



Export metadata



Items in accedaCRIS are protected by copyright, with all rights reserved, unless otherwise indicated.