A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Remote Data Monitoring Design Based on Wireless Sensor Network
2016
International Journal of Future Generation Communication and Networking
In this paper, it takes the introduction of the wireless sensor network technology as the breakthrough point, with the help of introducing the architecture of wireless sensor network, discussing the remote ...
Through GPRS terminal, transmitting the data from the wireless sensor network to the remote host computer, so as to realize the remote access of the detecting data at the spot. ...
The Gateway Module of Wireless Sensor Network The gateway module of wireless sensor network is a crucial module in wireless sensor network, which can be responsible for the wireless sensor network to obtain ...
doi:10.14257/ijfgcn.2016.9.8.01
fatcat:ju5btarl5nhyfdhwajceppzvz4
The Reliability of Wireless Sensor Network on Pipeline Monitoring System
2017
Journal of Mathematical and Fundamental Sciences
In this research, a wireless mesh network for a pipeline monitoring system was designed and developed. Sensor nodes were placed at each branch in the pipe system. ...
The wireless sensor network (WSN) is an attractive technology, which combines embedded systems and communication networks making them more efficient and effective. ...
Introduction In recent years, wireless sensor networks have been developed for many different applications, such as agricultural monitoring [1] , gas detection [2] , volcano monitoring [3] , environmental ...
doi:10.5614/j.math.fund.sci.2017.49.1.5
fatcat:wvianr6tabadvd2p6cxhqn5dua
Common Security Issues and Challenges in Wireless Sensor Networks and IEEE 802.11 Wireless Mesh Networks
2009
International Journal of Digital Content Technology and its Applications
Both Wireless Mesh Network (WMN) and Wireless Sensor Network (WSN) are multi-hop wireless networks. ...
Wireless sensor nodes have computation, memory and power limitations, which do not allow for implementation of complex security mechanism. ...
, disruption and absorption. ...
doi:10.4156/jdcta.vol3.issue1.naeem
fatcat:vg4pmct4djerlhp3t52ew2pgcq
Comprehensive Overview of Security and Privacy of Data Transfer in Wireless ad Hock Network
2018
Modern Applied Science
Wireless ad-hoc network is a decentralized wireless network that does not have a permanent structure. Client devices are connected to form wireless network. ...
data and interference in the operation of equipment and devices in order to disrupt their activity and even disable them.A possible response to these threats is the spread of independent and decentralized ...
At the same time, it should be noted that in sensor networks, the ability to protect the network against DoS attacks routing disruptions is much less than in MANET networks. ...
doi:10.5539/mas.v12n12p185
fatcat:mz5kni4gdfhltkpy3wnggilkxy
Continuous camera-based monitoring for assistive environments
2008
Proceedings of the 1st ACM international conference on PErvasive Technologies Related to Assistive Environments - PETRA '08
To improve flexibility and reduce cost, SICS connects distributed cameras through a self-organizing wireless mesh network. ...
In this paper, we propose Sensor-Integrated Camera Surveillance (SICS) to address this problem. ...
Acknowledgments This work is supported in part by the Research Council and Center of Network and Information Security at University of Massachusetts Lowell. ...
doi:10.1145/1389586.1389623
dblp:conf/petra/ChenGLW08
fatcat:oyt4ts43hfbwlnmctcx7vocprq
Comparisons of ZigBee Personal Area Network (PAN) Interconnection Methods
2007
2007 4th International Symposium on Wireless Communication Systems
Medical sensors in a human body self organize in a ZigBee Personal Area Network (PAN). At a higher level, these PANs are interconnected in a Healthnet. ...
ZigBee's low power consumption, built-in security method and ratified specifications make it very suitable to be used with medical sensor devices. ...
Applications such as industrial control and monitoring, wireless sensor networks, asset and inventory tracking would benefit from such topology. ...
doi:10.1109/iswcs.2007.4392357
fatcat:f22grfsy5ncxpkeqyddee36244
Dynamic Channel Allocation for effective self Reconfigurable wireless mesh network
2013
IOSR Journal of Engineering
Wireless Mesh Networks (WMNs) consist of mesh routers and mesh clients for their lifetime, multihop wireless mesh networks (WMNs) experience frequent link failures caused by channel interference, dynamic ...
, leader assigning problems etc, so in order improve the network performance we going to implement a new concept Breadth First Search Channel Assignment (BFS-CA) algorithm against with E-ARS so that it ...
The channel detection sensors monitor and record the traffic on each channel. ...
doi:10.9790/3021-03230509
fatcat:ijec3otcvvhtffgqagrvbplkr4
Cooperative Mesh Networks
[chapter]
2013
Next-Generation Wireless Technologies
Fig. 2.1 Wireless mesh network [9] users, laptop users and other wireless devices etc. Mesh routers forward traffic to and from the gateways. ...
Much work has already been done in the area of wireless mesh networks and cooperative communication networks. ...
The mesh clients in this case are several other wireless technologies, like sensor networks, separate wireless mesh networks with a gateways to this cooperative mesh network, Ad-Hoc networks, WLAN networks ...
doi:10.1007/978-1-4471-5164-7_2
fatcat:sjdw57w3cfhdzfkbv5zpn7rxhy
Truthful Detection of Selfish Malicious Packet Dropping Nodes in Wireless Ad Hoc Network
2018
International Journal for Research in Applied Science and Engineering Technology
We present a scalable, effective and practical approach for detection of packet-drop attacks in ad hoc networks. ...
However, this illusion is shattered-as are implicit assumptions of availability, confidentiality, or integrity-when network routers are subverted to act in a malicious fashion. ...
RELATED WORK Coverage problems in wireless ad hoc sensor networks were discussed by Chen and Koutsoubos. ...
doi:10.22214/ijraset.2018.3426
fatcat:qx7jnjue6ne5rnpgvvtzeuc5bm
WIRELESS SENSOR NETWORK PERFORMANCE ANALYSIS AND EFFECT OF BLACKHOLE AND SINKHOLE ATTACKS
2016
Jurnal Teknologi
The widespread usage of Wireless sensor networks in various fields and application make it vulnerable to variety of security threats and attacks. ...
In this study, we discuss security threats and presents the effects of Black and Sink hole attacks. Further, the study presents related work and current issues in wireless sensor network. ...
agents called Honeypots which detects Blackhole attacks in wireless sensor networks. ...
doi:10.11113/jt.v78.8254
fatcat:arawb25oovhvromqmdiy6qnnqe
Study on security of Wireless Sensor Networks in smart grid
2010
2010 International Conference on Power System Technology
Wireless Sensor Networks (WSNs) • Sensor networks capture valuable data for controlled networks, integral to smart grid development • Wireless Multimedia Sensor Networks include various high-tech researched ...
sensors, multimodal cameras (radiation detection, sunlight, wind, temperature, etc…) • $Low Cost compared to wired counterparts (wiring cost included) • Currently Utilized in military applications, environmental ...
doi:10.1109/powercon.2010.5666729
fatcat:kirae22jv5fsrbaoqjulwl5tea
Data Exchange in Ad-Hoc Network Using AMD and TwoStep Authentication Framework
2017
International Journal of Emerging Research in Management and Technology
ntrusion detection over the last few years, assumed top importance in the world of network security and as in the case of wireless adhoc networks also. ...
There have been numerous studies in the field of security in sensor networks, being Intrusion Detection System (IDS) among the most used tools in this area. ...
LITERATURE SURVEY 1) Misbehaving router detection in link-state routing for wireless mesh networks Author: Ács, G. Lab. of Cryptography & Syst. ...
doi:10.23956/ijermt/v6n2/123
fatcat:tuqvqzfadbgblf7ezvmpswp6mm
CYBER ATTACKS ON SCADA BASED TRAFFIC LIGHT CONTROL SYSTEMS IN THE SMART CITIES
2021
The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
Network-Based Intrusion Detection Systems and Host-Based Intrusion Detection Systems can be used to detect and stop Malware Attacks, Buffer Overflow Attacks, DoS attacks, and Jamming Attacks. ...
transportation disruptions. ...
of nodes, and is an important threat to wireless sensor networks (Avcı et al, 2017) . ...
doi:10.5194/isprs-archives-xlvi-4-w5-2021-411-2021
fatcat:aqo64daj3nd6zhtctpmjvupreq
Performance Analysis of Overcoming Far-end Congestion in Large-Scale Networks
2017
International Journal of Computer Applications
Due to the long inter-router latency, the in-flight packets (and credits) result in inaccurate congestion data and might cause inaccurate adaptive routing selections. ...
Today, interconnections networks are utilized during a vary of applications like switch and router materials, processormemory interconnect, I/O interconnects, and on-chip networks, to call a couple of. ...
THEORY A node at some point in a wireless sensor network (WSN) might be a small embedded computing device that interfaces with sensors/actuators and communicates using short-range wireless transmitters ...
doi:10.5120/ijca2017915215
fatcat:wq4giecx7ja3limdtym6unlioa
Detecting and Punishing the Selfish Node and its Behavior in WSN
English
2014
International Journal of Computer & Organization Trends
English
If such activities occurs within most of the nodes in the network, the network is disrupted. Selfish behavior detection and punishment is an essential requirement in wireless sensor networks. ...
In Wireless Sensor Network (WSN) communication, every node transmits data packets to further nodes and spend its resources like battery power, CPU time and memory. ...
RELETED WORK When a node becomes selfish, the network doesn't appropriately work in instance of relocating data in wireless sensor network. ...
doi:10.14445/22492593/ijcot-v6p303
fatcat:i7oqpcmi6fep3gafywe6omzwgq
« Previous
Showing results 1 — 15 out of 3,728 results