381 Hits in 9.4 sec

Automated Real-Time Intelligent Traffic Control System for Smart Cities Using Wireless Sensor Networks

Adil Hilmani, Abderrahim Maizate, Larbi Hassouni
2020 Wireless Communications and Mobile Computing  
In this article, we propose an intelligent traffic control system based on the design of a wireless sensor network (WSN) in order to collect data on road traffic and also on available parking spaces in  ...  density of traffic in most urban areas visited by motorists such as offices, downtown, and establishments based on several modern technologies, including wireless sensor networks (WSNs), surveillance  ...  Techniques based on clustering are the hierarchical techniques most commonly used in wireless sensor networks [13] [14] [15] .  ... 
doi:10.1155/2020/8841893 fatcat:c2prsdzefvdpvfclp7zfmoe4jy

A Study on Security in Wireless Sensor Networks

Shabnam Kumari, Sumit Dalal
2018 International Journal of Trend in Scientific Research and Development  
Wireless Sensor Network (WSN) is an emerging technology that shows great assure for various futuristic applications both for public and military.  ...  When sensor networks are deployed in an aggressive terrain, security becomes extremely important, as they are prone to different types of despite attacks.  ...  ) Hybrid (mainly wireless partly wired) sensor network Uses wormholes to avoid jamming Statistical En-Route Filtering [29] Information Spoofing Large number of sensors, highly dense  ... 
doi:10.31142/ijtsrd12931 fatcat:e27qsiz5wjggfh3jringivfe3y

Analysis of Security Attacks and Taxonomy in Underwater Wireless Sensor Networks

Irfan Ahmad, Taj Rahman, Asim Zeb, Inayat Khan, Inam Ullah, Habib Hamam, Omar Cheikhrouhou, Hamada Esmaiel
2021 Wireless Communications and Mobile Computing  
Underwater Wireless Sensor Networks (UWSN) have gained more attention from researchers in recent years due to their advancement in marine monitoring, deployment of various applications, and ocean surveillance  ...  Many review articles are addressed some of the security attacks and taxonomy of the Underwater Wireless Sensor Networks.  ...  Moreover, refs. [14] enhanced detection rates in mobile sensor nodes compared to the static and hybrid sensor nodes. 2.1.3. Enabling Technologies.  ... 
doi:10.1155/2021/1444024 fatcat:io4naxc7aneglnu42ylll22qyq

Wireless Sensor Network- Challenges and Possibilities

Amit Rathee, Randeep Singh, Abhishilpa Nandini
2016 International Journal of Computer Applications  
Wireless Sensor Network (WSN) is the current research field in computer science & has growing use in day to day life.  ...  This paper highlights WSN, its architecture, challenges, applications and classification of various protocols concerning it. It also classifies various security protocols to make WSN a secure network.  ...  The various hybrid protocols are CAT Based, A-MAC, IEEE 802.15.4 and Z-MAC ATTACKS &SECURITY PROTOCOLS FOR WSN Since, wireless network is generally deployed in hostile environment.  ... 
doi:10.5120/ijca2016909221 fatcat:bv7bgkhltvdqxax37qtcdcyyqu

Multihop Ad Hoc Networking: The Reality

M. Conti, S. Giordano
2007 IEEE Communications Magazine  
Wireless sensor networks (WSN) represent a special class of application-driven multihop ad hoc networks.  ...  The characteristics of wireless communications, amplified by the multihop communication paradigm, make it useful to share the knowledge of the wireless medium available at the physical and MAC (media access  ...  Wireless sensor networks (WSN) represent a special class of application-driven multihop ad hoc networks.  ... 
doi:10.1109/mcom.2007.343617 fatcat:shejtpxihrgubk72lvj4g36vey

Wireless Sensor Network for Vehicle Speed Monitoring and Traffic Routing System

Rajesh Kannan Megalingam, Vineeth Mohan, Ajay Mohanan, Paul Leons, Rizwin Shooja
2010 2010 International Conference on Mechanical and Electrical Technology  
A smart Vehicle Speed Monitoring and Traffic Routing System (VSMTRS) is proposed using Wireless Sensor Networks to monitor and report about the speeding vehicles and also to regulate the traffic.  ...  The system is built up of wireless modules including Crossbow MicaZ mote MPR2400, a 2.4 GHz IEEE 802.15.4, Tiny Wireless Measurement System (TWMS), a data acquisition card MDA320CA and a base station MIB510  ...  ACKNOWLEDGZEMENT We gratefully acknowledge the Almighty GOD who gave us strength and health to successfully complete this venture.  ... 
doi:10.1109/icmet.2010.5598438 fatcat:2enz6sc5lfbrzk2ttgkdzimsby


Raja Waseem Anwar, Majid Bakhtiari, Anazida Zainal, Kashif Naseer Qureshi
2016 Jurnal Teknologi  
These security attacks occur when an adversary compromised a sensor node by inject false measurements and divert real time network traffic.  ...  The widespread usage of Wireless sensor networks in various fields and application make it vulnerable to variety of security threats and attacks.  ...  In WSN network, various different types of sensor nodes are communicating with each other through multihop wireless network.  ... 
doi:10.11113/jt.v78.8254 fatcat:arawb25oovhvromqmdiy6qnnqe

2012 TMC Annual Index

2013 IEEE Transactions on Mobile Computing  
Peng, Shaoliang, +, TMC Aug. 2012 1274-1286 Position and Movement Detection of Wireless Sensor Network Devices Rel- ative to a Landmark Graph.  ...  Zhou, Zhong, +, TMC Jan. 2012 139-154 Tight Performance Bounds of Multihop Fair Access for MAC Protocols in Wireless Sensor Networks and Underwater Sensor Networks.  ... 
doi:10.1109/tmc.2013.1 fatcat:qp57tpkfx5gbrc3dvtetebm3ui

Security Issues and Challenges in Event-Driven Wireless Sensor Networks

Lu Lu Liang, Qi Zou, Guang Yang, Lei Shi
2013 Advanced Materials Research  
Recently, wireless sensor networks (WSNs) have attracted a lot of attention from the network research community, especially in the aspect of event-driven wireless sensor networks (EWSNs), such as adversary  ...  locating, fire detection and so on.As the nature of importance of event monitoring, security has to be assured in both of communication and processing.  ...  Depending on the interaction patterns between sources and sinks, these applications of wireless sensor networks can be categorized as follows [2] :  Event detection: A large amount of sensor nodes are  ... 
doi:10.4028/ fatcat:vkejfrc4fjbx3jhmmyxrzvapm4

Table of content

2009 2009 IEEE International Conference on Pervasive Computing and Communications  
Mobile Team Coordination in Wireless Sensor and Actuator Networks A Novel Communications Protocol Using Geographic Routing for Swarming UAVs Performing a Search Mission A Policy-Based Management Architecture  ...  Ad Hoc Networks Implementation of a MAC Protocol for QoS Support in Wireless Sensor Networks Reliable Ranging Technique based on Statistical RSSI Analyses for an Ad-Hoc Proximity Detection System 121.  ... 
doi:10.1109/percom.2009.4912745 fatcat:fhuymlscefcqzge6hrv75diqou

Secure Data Transmission by Detecting Different Attacks in CRN to improve the throughput

2019 International Journal of Engineering and Advanced Technology  
In this work, present a CRN architecture , Different Protocol, with complete rundown of major known security dangers and assaults inside a Cognitive Radio Network (CRN).  ...  Our goal in this paper is to dissect the distinctive security issues of the primary ongoing advancements of Cognitive Radio Networks with proper resource allocation to improve the throughput.  ...  The network is partitioned into different zones and different protocols are used for two zones. The example of Hybrid Routing Protocol [6, 17, 18] is Zone Routing Protocol. V.  ... 
doi:10.35940/ijeat.b3498.129219 fatcat:i4mfj762hnabvloawoxq3t24ay

Cognitive Radio Wireless Sensor Networks: Applications, Challenges and Research Trends

Gyanendra Joshi, Seung Nam, Sung Kim
2013 Sensors  
A cognitive radio wireless sensor network is one of the candidate areas where cognitive techniques can be used for opportunistic spectrum access.  ...  , potential application areas of cognitive radio wireless sensor networks, challenges and research trend in cognitive radio wireless sensor networks.  ...  [78] proposed a cooperative spectrum sensing scheme for CR-WSNs. In this scheme, CR wireless sensors detect the channels using an energy detection technique.  ... 
doi:10.3390/s130911196 pmid:23974152 pmcid:PMC3821336 fatcat:2lhysftvu5b3dblei5jx4t7ase

Intrusion Detection Systems

2019 International journal of recent technology and engineering  
This paper presents a detailed review of the intrusion detection techniques used in WSNs. More specifically, the existing methods for blackhole and sinkhole attacks detection are reviewed.  ...  This survey also highlights the research gap in this domain and provides better scope for the advanced work.  ...  et al. (2016) [53] detected sinkhole attack based on the analysis of routing behaviour in a wireless sensor network.  ... 
doi:10.35940/ijrte.b1540.0982s1119 fatcat:pav2ryuatzdjlns3mhdyekvosm

Trends of Recent Secure Communication System and its Effectiveness in Wireless Sensor Network

Manjunath B, P.V. Rao
2016 International Journal of Advanced Computer Science and Applications  
sensor network.  ...  Out of many other significant problems e.g. routing, energy, load balancing, resource allocation, there is a lesser extent of effective security protocols towards solving security pitfalls in wireless  ...  There are three types of routing protocols in wireless sensor network i.e. flat, hierarchical, and hybrid [3] .  ... 
doi:10.14569/ijacsa.2016.070918 fatcat:6vc7efmyyfbgrecyfeqe6mebde

A Novel Review on Security and Routing Protocols in MANET

Muhammad Kashif Nazir, Rameez U. Rehman, Atif Nazir
2016 Communications and Network  
MANET works under no fixed infrastructure in which every node works likes a router that stores and forwards packet to final destination.  ...  This article examines different techniques to manage congestion control, security issues, different layers attacks, routing protocols and challenges that are faced by MANET.  ...  Acknowledgements We thank to our respectable teachers for giving us this chance to increase and share our knowledge.  ... 
doi:10.4236/cn.2016.84020 fatcat:xdfe4lckovbcdlehvbkzpsqpxi
« Previous Showing results 1 — 15 out of 381 results