3,728 Hits in 3.7 sec

The Remote Data Monitoring Design Based on Wireless Sensor Network

Jiantao Cui, Han Li
2016 International Journal of Future Generation Communication and Networking  
In this paper, it takes the introduction of the wireless sensor network technology as the breakthrough point, with the help of introducing the architecture of wireless sensor network, discussing the remote  ...  Through GPRS terminal, transmitting the data from the wireless sensor network to the remote host computer, so as to realize the remote access of the detecting data at the spot.  ...  The Gateway Module of Wireless Sensor Network The gateway module of wireless sensor network is a crucial module in wireless sensor network, which can be responsible for the wireless sensor network to obtain  ... 
doi:10.14257/ijfgcn.2016.9.8.01 fatcat:ju5btarl5nhyfdhwajceppzvz4

The Reliability of Wireless Sensor Network on Pipeline Monitoring System

Hafizh Prihtiadi, Mitra Djamal
2017 Journal of Mathematical and Fundamental Sciences  
In this research, a wireless mesh network for a pipeline monitoring system was designed and developed. Sensor nodes were placed at each branch in the pipe system.  ...  The wireless sensor network (WSN) is an attractive technology, which combines embedded systems and communication networks making them more efficient and effective.  ...  Introduction In recent years, wireless sensor networks have been developed for many different applications, such as agricultural monitoring [1] , gas detection [2] , volcano monitoring [3] , environmental  ... 
doi:10.5614/ fatcat:wvianr6tabadvd2p6cxhqn5dua

Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks

Tahir Naeem
2009 International Journal of Digital Content Technology and its Applications  
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks.  ...  Wireless sensor nodes have computation, memory and power limitations, which do not allow for implementation of complex security mechanism.  ...  , disruption and absorption.  ... 
doi:10.4156/jdcta.vol3.issue1.naeem fatcat:vg4pmct4djerlhp3t52ew2pgcq

Comprehensive Overview of Security and Privacy of Data Transfer in Wireless ad Hock Network

Faten Hamad, Hussam N. Fakhouri, Osama Rababah
2018 Modern Applied Science  
Wireless ad-hoc network is a decentralized wireless network that does not have a permanent structure. Client devices are connected to form wireless network.  ...  data and interference in the operation of equipment and devices in order to disrupt their activity and even disable them.A possible response to these threats is the spread of independent and decentralized  ...  At the same time, it should be noted that in sensor networks, the ability to protect the network against DoS attacks routing disruptions is much less than in MANET networks.  ... 
doi:10.5539/mas.v12n12p185 fatcat:mz5kni4gdfhltkpy3wnggilkxy

Continuous camera-based monitoring for assistive environments

Guanling Chen, Prabhu Govindaswamy, Nan Li, Jie Wang
2008 Proceedings of the 1st ACM international conference on PErvasive Technologies Related to Assistive Environments - PETRA '08  
To improve flexibility and reduce cost, SICS connects distributed cameras through a self-organizing wireless mesh network.  ...  In this paper, we propose Sensor-Integrated Camera Surveillance (SICS) to address this problem.  ...  Acknowledgments This work is supported in part by the Research Council and Center of Network and Information Security at University of Massachusetts Lowell.  ... 
doi:10.1145/1389586.1389623 dblp:conf/petra/ChenGLW08 fatcat:oyt4ts43hfbwlnmctcx7vocprq

Comparisons of ZigBee Personal Area Network (PAN) Interconnection Methods

Sewook Jung, Alexander Chang, Mario Gerla
2007 2007 4th International Symposium on Wireless Communication Systems  
Medical sensors in a human body self organize in a ZigBee Personal Area Network (PAN). At a higher level, these PANs are interconnected in a Healthnet.  ...  ZigBee's low power consumption, built-in security method and ratified specifications make it very suitable to be used with medical sensor devices.  ...  Applications such as industrial control and monitoring, wireless sensor networks, asset and inventory tracking would benefit from such topology.  ... 
doi:10.1109/iswcs.2007.4392357 fatcat:f22grfsy5ncxpkeqyddee36244

Dynamic Channel Allocation for effective self Reconfigurable wireless mesh network

Avinash Devare
2013 IOSR Journal of Engineering  
Wireless Mesh Networks (WMNs) consist of mesh routers and mesh clients for their lifetime, multihop wireless mesh networks (WMNs) experience frequent link failures caused by channel interference, dynamic  ...  , leader assigning problems etc, so in order improve the network performance we going to implement a new concept Breadth First Search Channel Assignment (BFS-CA) algorithm against with E-ARS so that it  ...  The channel detection sensors monitor and record the traffic on each channel.  ... 
doi:10.9790/3021-03230509 fatcat:ijec3otcvvhtffgqagrvbplkr4

Cooperative Mesh Networks [chapter]

Sumit Kumar, Garimella Rama Murthy, Naveen Chilamkurti
2013 Next-Generation Wireless Technologies  
Fig. 2.1 Wireless mesh network [9] users, laptop users and other wireless devices etc. Mesh routers forward traffic to and from the gateways.  ...  Much work has already been done in the area of wireless mesh networks and cooperative communication networks.  ...  The mesh clients in this case are several other wireless technologies, like sensor networks, separate wireless mesh networks with a gateways to this cooperative mesh network, Ad-Hoc networks, WLAN networks  ... 
doi:10.1007/978-1-4471-5164-7_2 fatcat:sjdw57w3cfhdzfkbv5zpn7rxhy

Truthful Detection of Selfish Malicious Packet Dropping Nodes in Wireless Ad Hoc Network

R Sharmila
2018 International Journal for Research in Applied Science and Engineering Technology  
We present a scalable, effective and practical approach for detection of packet-drop attacks in ad hoc networks.  ...  However, this illusion is shattered-as are implicit assumptions of availability, confidentiality, or integrity-when network routers are subverted to act in a malicious fashion.  ...  RELATED WORK Coverage problems in wireless ad hoc sensor networks were discussed by Chen and Koutsoubos.  ... 
doi:10.22214/ijraset.2018.3426 fatcat:qx7jnjue6ne5rnpgvvtzeuc5bm


Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal, Kashif Naseer Qureshi
2016 Jurnal Teknologi  
The widespread usage of Wireless sensor networks in various fields and application make it vulnerable to variety of security threats and attacks.  ...  In this study, we discuss security threats and presents the effects of Black and Sink hole attacks. Further, the study presents related work and current issues in wireless sensor network.  ...  agents called Honeypots which detects Blackhole attacks in wireless sensor networks.  ... 
doi:10.11113/jt.v78.8254 fatcat:arawb25oovhvromqmdiy6qnnqe

Study on security of Wireless Sensor Networks in smart grid

Yufei Wang, Weimin Lin, Tao Zhang
2010 2010 International Conference on Power System Technology  
Wireless Sensor Networks (WSNs) • Sensor networks capture valuable data for controlled networks, integral to smart grid development • Wireless Multimedia Sensor Networks include various high-tech researched  ...  sensors, multimodal cameras (radiation detection, sunlight, wind, temperature, etc…) • $Low Cost compared to wired counterparts (wiring cost included) • Currently Utilized in military applications, environmental  ... 
doi:10.1109/powercon.2010.5666729 fatcat:kirae22jv5fsrbaoqjulwl5tea

Data Exchange in Ad-Hoc Network Using AMD and TwoStep Authentication Framework

Pournima Sadhu, R. C. Roychaudhary
2017 International Journal of Emerging Research in Management and Technology  
ntrusion detection over the last few years, assumed top importance in the world of network security and as in the case of wireless adhoc networks also.  ...  There have been numerous studies in the field of security in sensor networks, being Intrusion Detection System (IDS) among the most used tools in this area.  ...  LITERATURE SURVEY 1) Misbehaving router detection in link-state routing for wireless mesh networks Author: Ács, G. Lab. of Cryptography & Syst.  ... 
doi:10.23956/ijermt/v6n2/123 fatcat:tuqvqzfadbgblf7ezvmpswp6mm


C. Özarpa, İ. Avcı, B. F. Kınacı, S. Arapoğlu, S. A. Kara
2021 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
Network-Based Intrusion Detection Systems and Host-Based Intrusion Detection Systems can be used to detect and stop Malware Attacks, Buffer Overflow Attacks, DoS attacks, and Jamming Attacks.  ...  transportation disruptions.  ...  of nodes, and is an important threat to wireless sensor networks (Avcı et al, 2017) .  ... 
doi:10.5194/isprs-archives-xlvi-4-w5-2021-411-2021 fatcat:aqo64daj3nd6zhtctpmjvupreq

Performance Analysis of Overcoming Far-end Congestion in Large-Scale Networks

Zaheeruddin Z., Sanjeev Gupta
2017 International Journal of Computer Applications  
Due to the long inter-router latency, the in-flight packets (and credits) result in inaccurate congestion data and might cause inaccurate adaptive routing selections.  ...  Today, interconnections networks are utilized during a vary of applications like switch and router materials, processormemory interconnect, I/O interconnects, and on-chip networks, to call a couple of.  ...  THEORY A node at some point in a wireless sensor network (WSN) might be a small embedded computing device that interfaces with sensors/actuators and communicates using short-range wireless transmitters  ... 
doi:10.5120/ijca2017915215 fatcat:wq4giecx7ja3limdtym6unlioa

Detecting and Punishing the Selfish Node and its Behavior in WSN

Sujit Kumar Das, Pinaki Sankar Chatterjee, Monideepa Roy
2014 International Journal of Computer & Organization Trends  
If such activities occurs within most of the nodes in the network, the network is disrupted. Selfish behavior detection and punishment is an essential requirement in wireless sensor networks.  ...  In Wireless Sensor Network (WSN) communication, every node transmits data packets to further nodes and spend its resources like battery power, CPU time and memory.  ...  RELETED WORK When a node becomes selfish, the network doesn't appropriately work in instance of relocating data in wireless sensor network.  ... 
doi:10.14445/22492593/ijcot-v6p303 fatcat:i7oqpcmi6fep3gafywe6omzwgq
« Previous Showing results 1 — 15 out of 3,728 results