Academic literature on the topic 'Wireless fire security sensor nodes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless fire security sensor nodes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wireless fire security sensor nodes"

1

S.R, Vijayalakshmi, and Muruganand S. "Design Challenges in Wireless Fire Security Sensor Nodes." International Journal of Embedded Systems and Applications 5, no. 2 (2015): 31–44. http://dx.doi.org/10.5121/ijesa.2015.5203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shabnam, Kumari, Dalal Sumit, and Rashmi. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 477–83. https://doi.org/10.31142/ijtsrd12931.

Full text
Abstract:
Wireless Sensor Networks WSNs present myriad application opportunities for several applications such as precision agriculture, environmental and habitat monitoring, traffic control, industrial process monitoring and control, home automation and mission critical surveillance applications such as military surveillance, healthcare elderly, home monitoring applications, disaster relief and management, fire detection applications among others. Since WSNs are used in mission critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique con
APA, Harvard, Vancouver, ISO, and other styles
3

Dora, Jean Rosemond, and Karol Nemoga. "Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks." Journal of Cybersecurity and Privacy 1, no. 4 (2021): 553–79. http://dx.doi.org/10.3390/jcp1040028.

Full text
Abstract:
The development of the wireless sensor networks technology commonly named WSNs has been gaining a significantly increased amount of attention from researchers over the last few decades. Its large number of sensor nodes is one of the features that makes it beneficial to the technology. The sensors can communicate with each other to form a network. These sensor nodes are generally used for diverse applications, such as pressure monitoring, fire detection, target tracking, and health monitoring, etc. However, the downside is that WSNs are often deployed in hostile, critical environments where the
APA, Harvard, Vancouver, ISO, and other styles
4

RB, Dayananda, G.Manoj Someswar, and T.P. Suryachandra Rao. "Secure Data Sharing with ABE in Wireless Sensor Networks." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 02 (2015): 1523–33. https://doi.org/10.5281/zenodo.14770379.

Full text
Abstract:
This research paper addresses the issue of secure data sharing for distributed data storage in Wireless Sensor Networks (WSNs). In WSNs, storing data at local sensor nodes or at designated in-network nodes greatly saves the network-wide communication load and has a lot of benefits such as energy-efficiency. However, unattended wireless sensor nodes are very likely subject to strong attacks such as physical compromise. In this sense a storage node in WSNs can be viewed as an untrusted storage since the owner of the WSN may have concerns on data security in mission-critical applications if data
APA, Harvard, Vancouver, ISO, and other styles
5

Namboodiri, Vinod, and Abtin Keshavarzian. "Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks." Journal of Computer Networks and Communications 2011 (2011): 1–19. http://dx.doi.org/10.1155/2011/195685.

Full text
Abstract:
Collection of rare but delay-critical messages from a group of sensor nodes is a key process in many wireless sensor network applications. This is particularly important for security-related applications like intrusion detection and fire alarm systems. An event sensed by multiple sensor nodes in the network can trigger many messages to be sent simultaneously. We present Alert, a MAC protocol for collecting event-triggered urgent messages from a group of sensor nodes with minimum latency and without requiring any cooperation or prescheduling among the senders or between senders and receiver dur
APA, Harvard, Vancouver, ISO, and other styles
6

U, Maheswaran, Bhuvaneeshwaran V, Hemanathan M, and Jawahar K. "IoT Based coal mine safety monitoring and controlling." Journal of University of Shanghai for Science and Technology 23, no. 07 (2021): 1205–9. http://dx.doi.org/10.51201/jusst/21/07287.

Full text
Abstract:
Many coal miners are concerned about their safety in the workplace. Within subsurface mines, poor ventilation exposes workers to toxic gases, heat, and dust, which can lead to sickness, injury, and death. With the aid of an ARM controller, this work proposes a concept for an Internet of things (IoT), wireless sensor network (WSN) that can track temperature, humidity, and gas in an underground mine. This device uses a low-power, less-cost Arduino UNO, Node MCU, DHT11 sensor, gas sensor, fire sensor to detect fire and send an alarm, and LDR to detect light depending on light levels. Conventional
APA, Harvard, Vancouver, ISO, and other styles
7

Sree Ranjani, N. Y., A. G. Ananth, and L. Sudershan Reddy. "A Firebug Optimal Cluster based Data Aggregation for Healthcare Application." IOP Conference Series: Earth and Environmental Science 1057, no. 1 (2022): 012006. http://dx.doi.org/10.1088/1755-1315/1057/1/012006.

Full text
Abstract:
Abstract Majority of Wireless Sensor Networks (WSNs) are made up of huge sensor nodes with minimum cost, processing, communication capability and limited sensing. Because sensor nodes have limited resources, it’s critical to enhance bandwidth utilization, network lifetime and minimize the data transmission. The term data aggregation defines the method of integrating the sensor data to minimize the data transmission. However, WSN-based healthcare applications face privacy, and security concerns. In this paper design of a Fire Bug Swarm Optimal Cluster-Based Data Aggregation (FSOCDA) in WSN has
APA, Harvard, Vancouver, ISO, and other styles
8

Min, Jie, Junbin Liang, Xingpo Ma, and Hongling Chen. "STQ-SCS: An Efficient and Secure Scheme for Fine-Grained Spatial-Temporal Top- k Query in Fog-Based Mobile Sensor-Cloud Systems." Security and Communication Networks 2021 (May 28, 2021): 1–16. http://dx.doi.org/10.1155/2021/9939796.

Full text
Abstract:
With the emergence of the fog computing and the sensor-cloud computing paradigms, end users can retrieve the desired sensory data generated by any wireless sensor network (WSN) in a fog-based sensor-cloud system transparently. However, the fog nodes and the cloud servers may suffer from many kinds of attacks on the Internet and become semitrusted, which threatens the security of query processing in the system. In this paper, we investigated the problem of secure, fine-grained spatial-temporal Top- k query in fog-based mobile sensor-cloud systems (FMSCSs) and proposed a novel scheme named STQ-S
APA, Harvard, Vancouver, ISO, and other styles
9

Hussein, Safwan Mawlood, Juan Antonio López Ramos, and Abubakar Muhammad Ashir. "A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks." Electronics 11, no. 17 (2022): 2721. http://dx.doi.org/10.3390/electronics11172721.

Full text
Abstract:
The rapid growth of technology has resulted in the deployment of a large number of interconnected devices, resulting in a wide range of new societal services. Wireless sensor networks (WSNs) are a promising technology which is faced with the challenges of operating a large number of sensor nodes, information gathering, data transmission, and providing a means to act in different scenarios such as monitoring, surveillance, forest fire detection, and many others from the civil to military spectrum. The deployment scenario, the nature of the sensor-equipped nodes, and their communication methods
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Hongsong, and Zhongchuan Fu. "Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/852173.

Full text
Abstract:
Human health information from healthcare system can provide important diagnosis data and reference to doctors. However, continuous monitoring and security storage of human health data are challenging personal privacy and big data storage. To build secure and efficient healthcare application, Hadoop-based healthcare security communication system is proposed. In wireless biosensor network, authentication and key transfer should be lightweight. An ECC (Elliptic Curve Cryptography) based lightweight digital signature and key transmission method are proposed to provide wireless secure communication
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Wireless fire security sensor nodes"

1

Iwendi, Celestine O. "Security techniques and implementation for wireless sensor network nodes." Thesis, University of Aberdeen, 2012. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=195992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, An-Lun. "Security primitives for ultra-low power sensor nodes in wireless sensor networks." Diss., University of Pretoria, 2007. http://hdl.handle.net/2263/24343.

Full text
Abstract:
The concept of wireless sensor network (WSN) is where tiny devices (sensor nodes), positioned fairly close to each other, are used for sensing and gathering data from its environment and exchange information through wireless connections between these nodes (e.g. sensor nodes distributed through out a bridge for monitoring the mechanical stress level of the bridge continuously). In order to easily deploy a relatively large quantity of sensor nodes, the sensor nodes are typically designed for low price and small size, thereby causing them to have very limited resources available (e.g. energy, pr
APA, Harvard, Vancouver, ISO, and other styles
3

Bahari, Seyed Farshad. "Security of wireless sensor networks in the presence of captured nodes." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8873.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2008.<br>Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
4

Tian, Biming. "Key management for wireless sensor network security." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1157.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have attracted great attention not only in industry but also in academia due to their enormous application potential and unique security challenges. A typical sensor network can be seen as a combination of a number of low-cost sensor nodes which have very limited computation and communication capability, memory space, and energy supply. The nodes are self-organized into a network to sense or monitor surrounding information in an unattended environment, while the self-organization property makes the networks vulnerable to various attacks.Many cryptographic mechan
APA, Harvard, Vancouver, ISO, and other styles
5

Mihajlovic, Bojan. "Compression and security platform for the testing of wireless sensor network nodes." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18820.

Full text
Abstract:
This thesis considers the in-field testing of wireless sensor network (WSN) nodes as a means of providing increased network uptime. Such nodes operate with strict limits on energy, cost, computing power, and are prone to attack. While testing through software-based self-test (SBST) programs has advantages on WSN nodes, energy efficiency can be increased by compressing SBST programs before distributing them. Of several compression schemes considered for the task, the BSTW algorithm with Rice coding demonstrates node energy savings while providing a low memory footprint and good compression rati
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, An-Lun. "Security primitives for ultra-low power sensor nodes in wireless sensor networks An-Lun (Alan) Huang." Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-05052008-110318/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Megahed, Mohamed Helmy Mostafa. "SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31154.

Full text
Abstract:
Surveillance wireless sensor networks (WSNs) are highly vulnerable to the failure of the base station (BS) because attackers can easily render the network useless for relatively long periods of time by only destroying the BS. The time and effort needed to destroy the BS is much less than that needed to destroy the numerous sensing nodes. Previous works have tackled BS failure by deploying a mobile BS or by using multiple BSs, which requires extra cost. Moreover, despite using the best electronic countermeasures, intrusion tolerance systems and anti-traffic analysis strategies to protect the BS
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Wireless fire security sensor nodes"

1

Oreku, George S., and Tamara Pazynyuk. "Mathematical Model for Wireless Sensor Nodes Security." In Risk Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21269-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Zhe, Johann Großschädl, Lin Li, and Qiuliang Xu. "Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes." In Information Security and Privacy. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40253-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Salah, Mohammed Saïd, Abderrahim Maizate, Mohamed Ouzzif, and Mohamed Toumi. "How Mobile Nodes Influence Wireless Sensor Networks Security and Lifetime." In Lecture Notes in Networks and Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69137-4_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wenger, Erich. "Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38980-1_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Saxena, Nitesh, and Md Borhan Uddin. "Blink ’Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes." In Cryptology and Network Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10433-6_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Jing, Yuqiang Zhang, Fei Xu, Lei Zhou, and Shuanglin Jiang. "A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks." In Information Security Practice and Experience. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99807-7_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dyka, Zoya, and Peter Langendörfer. "Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks." In Signals and Communication Technology. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36169-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chowdhuri, Rajib, and Mrinal Kanti Deb Barma. "A Review on Coverage and Connectivity Through Random Deployment of Nodes in Wireless Sensor Network." In Advances in Computational Intelligence, Security and Internet of Things. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3666-3_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Khan, Asfandyar, Azween Abdullah, and Nurul Hasan. "Event Based Data Gathering in Wireless Sensor Networks." In Wireless Sensor Networks and Energy Efficiency. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0101-7.ch021.

Full text
Abstract:
Wireless sensor networks (WSANs) are increasingly being used and deployed to monitor the surrounding physical environments and detect events of interest. In wireless sensor networks, energy is one of the primary issues and requires the conservation of energy of the sensor nodes, so that network lifetime can be maximized. It is not recommended as a way to transmit or store all data of the sensor nodes for analysis to the end user. The purpose of this “Event Based Detection” Model is to simulate the results in terms of energy savings during field activities like a fire detection system in a remote area or habitat monitoring, and it is also used in security concerned issues. The model is designed to detect events (when occurring) of significant changes and save the data for further processing and transmission. In this way, the amount of transmitted data is reduced, and the network lifetime is increased. The main goal of this model is to meet the needs of critical condition monitoring applications and increase the network lifetime by saving more energy. This is useful where the size of the network increases. Matlab software is used for simulation.
APA, Harvard, Vancouver, ISO, and other styles
10

Ortmann, Steffen, Michael Maaser, and Peter Langendoerfer. "Self-Adapting Event Configuration in Ubiquitous Wireless Sensor Networks." In Technological Innovations in Adaptive and Dependable Systems. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0255-7.ch007.

Full text
Abstract:
Wireless Sensor Networks are the key-enabler for low cost ubiquitous applications in the area of homeland security, health-care, and environmental monitoring. A necessary prerequisite is reliable and efficient event detection in spite of sudden failures and environmental changes. Due to the fact that the sensors need to be low cost, they have only scarce resources leading to a certain level of failures of sensor nodes or sensing devices attached to the nodes. Available fault tolerant solutions are mainly customized approaches that revealed several shortcomings, particularly in adaptability and energy efficiency. The authors present a complete event detection concept including all necessary steps from formal event definition to autonomous device configuration. It features an event definition language that allows defining complex events as well as enhance the reliability by tailor-made voting schemes and application constraints. Based on that, this paper introduces a novel approach for self-adapting on-node and in-network processing, called Event Decision Tree (EDT). EDT autonomously adapts to available resources and environmental conditions, even though it requires to (re-)organize collaboration between neighboring nodes for evaluation. The authors’ approach achieves fine-grained event-related fault tolerance with configurable adaptation rate while enhancing maintainability and energy efficiency.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wireless fire security sensor nodes"

1

Bhat, Abhijith, Achyuta V. Bhardwaj, Nishanth S. Kotian, and Smitha G. Prabhu. "Efficient Real-Time Monitoring and Fire Prevention Strategies in Bord-and-Pillar Coal Mines Utilizing Wireless Sensor Networks." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10690931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Asha Rani, M., and H. R. Roopashree. "Enhancing Wireless sensor network security with Trust-aware Routing protocol(TRP)Based on packet Forwarding Ratio Analysis to detect malicious nodes." In 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2024. http://dx.doi.org/10.1109/ickecs61492.2024.10616466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Davis, Jesse, and Nina Berry. "A modular architecture for wireless sensor network nodes." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2004. http://dx.doi.org/10.1117/12.542850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pazynyuk, Tamara, Jian-Zhong Li, and George S. Oreku. "Mathematical model for wireless sensor nodes security." In 2008 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2008. http://dx.doi.org/10.1109/icmlc.2008.4620607.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Iwendi, C. O., and A. R. Allen. "Enhanced security technique for wireless sensor network nodes." In IET Conference on Wireless Sensor Systems (WSS 2012). IET, 2012. http://dx.doi.org/10.1049/cp.2012.0610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Du, Qiao-Ling, Zhi-Hong Qian, Hong Jiang, and Shu-Xun Wang. "Localization of Anchor Nodes for Wireless Sensor Networks." In 2008 New Technologies, Mobility and Security (NTMS). IEEE, 2008. http://dx.doi.org/10.1109/ntms.2008.ecp.57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohapatra, Santoshinee, and Pabitra Mohan Khilar. "Forest fire monitoring and detection of faulty nodes using wireless sensor network." In TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7848647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

St. Pierre, Joseph, and Howard E. Michel. "Development of an intelligent wireless sensor network with mobile nodes." In SPIE Defense, Security, and Sensing, edited by Stephen Mott, John F. Buford, Gabe Jakobson, and Michael J. Mendenhall. SPIE, 2009. http://dx.doi.org/10.1117/12.818874.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Back, Jason M., Steven D. Beck, Mark A. Frank, and Eric Hoenes. "Air launch wireless sensor nodes (ALSN) for battle damage assessment (BDA)." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.665058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yang, Chaoqun, Xiangyu Li, Yongchang Liu, and Shujuan Yin. "Risk-Aware Leakage Resiliency for Wireless Sensor Network Nodes." In 2017 13th International Conference on Computational Intelligence and Security (CIS). IEEE, 2017. http://dx.doi.org/10.1109/cis.2017.00068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!