Filters








5,174 Hits in 4.8 sec

Secure sensor networks for perimeter protection

Sasikanth Avancha, Jeffrey Undercoffer, Anupam Joshi, John Pinkston
2003 Computer Networks  
Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense.  ...  constraints of sensor networks.  ...  Our protocol is designed to function correctly in sensor networks used for perimeter protection.  ... 
doi:10.1016/s1389-1286(03)00352-9 fatcat:upy4k4p3xndtlhughkinas3r3m

Sensor Network in Czech General Aviation

Jakub Kraus
2013 MAD: Magazine of Aviation Development  
This article focuses on possible use of sensor network in general aviation in Czech Republic for ensuring safety and security at small aerodromes.  ...  Using electrical and electronic networks consisting of sensors with different object can provide the following ways: a) Perimeter protection -protection signalling disruption of aerodrome perimeter, for  ...  Securing the perimeter Fence is used for security perimeter, which is relatively expensive or is used appropriately placed CCTV to scan the most vulnerable part of the aerodrome.  ... 
doi:10.14311/mad.2013.01.03 fatcat:br25gwyn4nc6xc5wjsimvnqfma

The System of Automatic Detection of Penetration through the Protected Perimeter Based on Fiber Optic Sensors and Neural Network
Система автоматического распознавания проникновения через охраняемый периметр на основе оптоволоконных датчиков и нейронной сети

A.A. Fartukov, V.P. Shumeyko, L.S. Kazarinov
2018 Bulletin of the South Ural State University Ser Computer Technologies Automatic Control & Radioelectronics  
the neural network, and then for analyzing its state.  ...  The article discusses the principle of constructing the software part of the alarm system's signal processing unit, which will solve the problem of detecting penetration through the protected perimeter  ...  These measures are ultimately aimed at tightening the requirements for perimeter security systems, which are designed to ensure the security of the protected facility.  ... 
doi:10.14529/ctcr180119 fatcat:hhvpe4xycfbbvo4erpgbjrbwaq

SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS

D.Sathian P. Samundiswary, D.Sathian
2020 Zenodo  
In this paper, a secure routing protocol named secured greedy perimeter stateless routing protocol (S-GPSR) is proposed for mobile sensor networks by incorporating trust based mechanism in the existing  ...  Geographical routing protocols of wireless sensor networks have been developed without considering the security aspects against these attacks.  ...  Section 3 deals with the proposed secured greedy perimeter stateless routing of wireless sensor networks.  ... 
doi:10.5281/zenodo.4120906 fatcat:o56hmbyqbbe43kyrbch5fmixmu

Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks

R. Rios, J. Lopez
2011 Computer journal  
The source-location privacy problem in Wireless Sensor Networks has been traditionally tackled by the creation of random routes for every packet transmitted from the source nodes to the base station.  ...  A permissive and a strict version of the protocol are studied for different adversarial models and the proposed schemes are evaluated through simulation experiments in terms of privacy protection and energy  ...  In general, both versions behave well for security perimeters longer than 2.  ... 
doi:10.1093/comjnl/bxr055 fatcat:b47bmvsndfeado2ihnizuiab2e

ENERGY EFFICIENT IMPROVEMENT GEOCAST FORWARDING IN MANET BASED ON A CLUSTERED STRUCTURE

PRASANTH K., SIVAKUMAR P.
2015 Journal of Engineering Science and Technology  
Mobile sinks (MSs) are very important in many wireless sensor network (WSN) applications for efficient data gathering, restricted sensor reprogramming, and for characteristic and revoking compromised sensors  ...  The innovative framework requires two disconnect key pools, solitary for to access the network, and one for pair wise key establishment between the sensors.  ...  The system use separate polynomial pools for movable sensor. Figure 1 shows the wireless sensor network with three-tire security.  ... 
doaj:9cb7c15ab66d4d7b8a25b1b2023d2156 fatcat:ecef4fpcs5dnxncm3f5q24lopm

Distributed Physical Sensors Network for the Protection of Critical Infrastractures Against Physical Attacks

M. P. Jarabo-Amores, M. Rosa-Zurera, D. de la Mata-Moya, A. Capria, A. L. Saverino, C. Callegari, F. Berizzi, P. Samczynski, K. Kulpa, M. Ummenhofer, H. Kuschel, A. Meta (+3 others)
2016 Proceedings of the 13th International Joint Conference on e-Business and Telecommunications  
It is designed as a network of sensor networks that combines DAB and DVB-T based passive radar, noise radar, Ku-band radar, infrared cameras, and RFID technologies.  ...  CITATIONS 0 READS 66 15 authors, including: Some of the authors of this publication are also working on these related projects: Multitech SeCurity system for intercOnnected space control groUnd staTions-SCOUT  ...  ACKNOWLEDGEMENTS The Optoelectronics Laboratory of the Spanish Aeroespace Institute (INTA) provided a data base of IR images for the design and validation of the infrared sensor network.  ... 
doi:10.5220/0006017601390150 dblp:conf/icete/Jarabo-AmoresRM16 fatcat:wkz7kwb7mbembk6rska4onqbgq

Pattern Recognition of Grating Perimeter Intrusion Behavior in Deep Learning Method

Xianfeng Li, Sen Xu, Xiaopeng Hua
2021 Symmetry  
The convolution neural network was introduced into the pattern recognition of the intrusion signals in the optical fiber perimeter defense zone, and the different characteristics of the intrusion signals  ...  An intrusion behavior recognition method based on deep learning is proposed in this paper in order to improve the recognition accuracy of raster perimeter intrusion behavior.  ...  perimeter security system.  ... 
doi:10.3390/sym13010087 fatcat:6df66emaljevredpe7op7oxg6u

Secured communications in cognitive radio networks

T. Perarasi, G. Nagarajan
2018 Advances in Modelling and Analysis D  
An unconditionally secure probabilistic groupbased key pre-distribution scheme for a heterogeneous wireless sensor network is considered.  ...  Enabling end to end secure communications between source and sink is significant for many Cognitive Radio Networks (CRNs).  ...  It is compared with secured greedy perimeter stateless routing protocol for different number of malicious nodes.  ... 
doi:10.18280/ama_d.230102 fatcat:2tkqukn6gvb7poufgwgcmyiut4

Security in Sensor Networks [chapter]

2010 Fundamentals of Sensor Network Programming  
Sensor networks have been identified as being useful in a variety of domains to include the battlefield and perimeter defense.  ...  We motivate the security problems that sensor networks face by developing a scenario representative of a large application class where these networks would be used in the future.  ...  CONCLUSIONS and FUTURE WORK A novel scenario defining perimeter protection as an application class of sensor networks was presented.  ... 
doi:10.1002/9780470890158.ch16 fatcat:bijhcp4mpbgx5al5o6zwqq5fmq

Optimization Problems in Infrastructure Security [chapter]

Evangelos Kranakis, Danny Krizanc
2016 Lecture Notes in Computer Science  
Sensor Coverage and Interference. 3. Evacuation. 4. Domain Protection and Blocking.  ...  Security in itself is undoubtedly a very broad and complex task which involves all layers of the communication process from physical to network.  ...  Patrolling occurs in any situation where we are required to monitor a region, such as the perimeter of a building or campus, for activities posing a potential security threat.  ... 
doi:10.1007/978-3-319-30303-1_1 fatcat:m2ksrj6bbrflblq4z3nqoog4fy

Wireless Sensor Networks for the Protection of an Electrical Energy Distribution Infrastructure [chapter]

António Grilo, Augusto Casaca, Mário Nunes, Carlos Fortunato
2010 IFIP Advances in Information and Communication Technology  
The sensor network interacts with the SCADA system of the electricity provider to allow for centralised control of the protection system.  ...  From a safety and security point of view, the electrical energy distribution infrastructure needs to be protected..  ...  The transport layer consists of a secured version of the Distributed Transport for Sensor Networks (DTSN) protocol developed by INOV [5] .  ... 
doi:10.1007/978-3-642-15479-9_35 fatcat:hrgrirn2czfsfmcyjjkj36stci

Multisensor system for the protection of critical infrastructure of a seaport

Mariusz Kastek, Rafał Dulski, Marek Zyczkowski, Mieczysław Szustakowski, Piotr Trzaskawka, Wiesław Ciurapinski, Grazyna Grelowska, Ignacy Gloza, Stanislaw Milewski, Karol Listewnik
2012 Unattended Ground, Sea, and Air Sensor Technologies and Applications XIV  
The paper will present the concept of multisensor security system for a harbor protection, capable of complex monitoring of selected critical objects within the protected area.  ...  Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface  ...  The presented complex, multisensor system can be deployed for the protection of real harbor area become valuable security component.  ... 
doi:10.1117/12.918595 fatcat:rvdwbhwl4na4tdn2osomnj6gsi

Conception of Smart Home Perimeter Security System Based on Solar Powered IoT Solutions

2019 International journal of recent technology and engineering  
This paper propose design a conception of Perimeter Security System we called "Outpost".  ...  General idea is organization of work of remote settled and independent powered security module using Raspberry Pi hardware platform and some IoT sensors.  ...  Thant the main reason in this project we planning to use solar powered street light stands as the IoT "Outpost" for perimeter security of the smart house. Figure 2.  ... 
doi:10.35940/ijrte.b1200.0982s1119 fatcat:bmgm2culdzhm3ac7q2wznlsoee

A wireless perimeter protection and intrusion detection system

Vibeke Libby
2010 44th Annual 2010 IEEE International Carnahan Conference on Security Technology  
Sensor systems with volumetric coverage of large areas are in high demand for general infrastructure protection.  ...  For example, it is possible to simultaneous locate and track single and multiple intruders in a protected area of 100,000 square feet with a single unit.  ...  For example, in a network where all sensors individually use battery power and communicate sensor-to-sensor, the battery will last for only hours.  ... 
doi:10.1109/ccst.2010.5678669 fatcat:t4f7phlz4zdm5oxms5xvdvt5km
« Previous Showing results 1 — 15 out of 5,174 results