Academic literature on the topic 'Wireless fire security sensor nodes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless fire security sensor nodes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Wireless fire security sensor nodes"
S.R, Vijayalakshmi, and Muruganand S. "Design Challenges in Wireless Fire Security Sensor Nodes." International Journal of Embedded Systems and Applications 5, no. 2 (2015): 31–44. http://dx.doi.org/10.5121/ijesa.2015.5203.
Full textShabnam, Kumari, Dalal Sumit, and Rashmi. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 477–83. https://doi.org/10.31142/ijtsrd12931.
Full textDora, Jean Rosemond, and Karol Nemoga. "Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks." Journal of Cybersecurity and Privacy 1, no. 4 (2021): 553–79. http://dx.doi.org/10.3390/jcp1040028.
Full textRB, Dayananda, G.Manoj Someswar, and T.P. Suryachandra Rao. "Secure Data Sharing with ABE in Wireless Sensor Networks." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 02 (2015): 1523–33. https://doi.org/10.5281/zenodo.14770379.
Full textNamboodiri, Vinod, and Abtin Keshavarzian. "Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks." Journal of Computer Networks and Communications 2011 (2011): 1–19. http://dx.doi.org/10.1155/2011/195685.
Full textU, Maheswaran, Bhuvaneeshwaran V, Hemanathan M, and Jawahar K. "IoT Based coal mine safety monitoring and controlling." Journal of University of Shanghai for Science and Technology 23, no. 07 (2021): 1205–9. http://dx.doi.org/10.51201/jusst/21/07287.
Full textSree Ranjani, N. Y., A. G. Ananth, and L. Sudershan Reddy. "A Firebug Optimal Cluster based Data Aggregation for Healthcare Application." IOP Conference Series: Earth and Environmental Science 1057, no. 1 (2022): 012006. http://dx.doi.org/10.1088/1755-1315/1057/1/012006.
Full textMin, Jie, Junbin Liang, Xingpo Ma, and Hongling Chen. "STQ-SCS: An Efficient and Secure Scheme for Fine-Grained Spatial-Temporal Top- k Query in Fog-Based Mobile Sensor-Cloud Systems." Security and Communication Networks 2021 (May 28, 2021): 1–16. http://dx.doi.org/10.1155/2021/9939796.
Full textHussein, Safwan Mawlood, Juan Antonio López Ramos, and Abubakar Muhammad Ashir. "A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks." Electronics 11, no. 17 (2022): 2721. http://dx.doi.org/10.3390/electronics11172721.
Full textChen, Hongsong, and Zhongchuan Fu. "Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/852173.
Full textDissertations / Theses on the topic "Wireless fire security sensor nodes"
Iwendi, Celestine O. "Security techniques and implementation for wireless sensor network nodes." Thesis, University of Aberdeen, 2012. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=195992.
Full textHuang, An-Lun. "Security primitives for ultra-low power sensor nodes in wireless sensor networks." Diss., University of Pretoria, 2007. http://hdl.handle.net/2263/24343.
Full textBahari, Seyed Farshad. "Security of wireless sensor networks in the presence of captured nodes." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8873.
Full textTian, Biming. "Key management for wireless sensor network security." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1157.
Full textMihajlovic, Bojan. "Compression and security platform for the testing of wireless sensor network nodes." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=18820.
Full textHuang, An-Lun. "Security primitives for ultra-low power sensor nodes in wireless sensor networks An-Lun (Alan) Huang." Pretoria : [s.n.], 2005. http://upetd.up.ac.za/thesis/available/etd-05052008-110318/.
Full textMegahed, Mohamed Helmy Mostafa. "SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31154.
Full textBook chapters on the topic "Wireless fire security sensor nodes"
Oreku, George S., and Tamara Pazynyuk. "Mathematical Model for Wireless Sensor Nodes Security." In Risk Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21269-2_3.
Full textLiu, Zhe, Johann Großschädl, Lin Li, and Qiuliang Xu. "Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor Nodes." In Information Security and Privacy. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40253-6_6.
Full textSalah, Mohammed Saïd, Abderrahim Maizate, Mohamed Ouzzif, and Mohamed Toumi. "How Mobile Nodes Influence Wireless Sensor Networks Security and Lifetime." In Lecture Notes in Networks and Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69137-4_23.
Full textWenger, Erich. "Hardware Architectures for MSP430-Based Wireless Sensor Nodes Performing Elliptic Curve Cryptography." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38980-1_18.
Full textSaxena, Nitesh, and Md Borhan Uddin. "Blink ’Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes." In Cryptology and Network Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10433-6_11.
Full textXu, Jing, Yuqiang Zhang, Fei Xu, Lei Zhou, and Shuanglin Jiang. "A Security Cycle Clock Synchronization Method Based on Mobile Reference Nodes in Wireless Sensor Networks." In Information Security Practice and Experience. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-99807-7_30.
Full textDyka, Zoya, and Peter Langendörfer. "Improving the Security of Wireless Sensor Networks by Protecting the Sensor Nodes against Side Channel Attacks." In Signals and Communication Technology. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36169-2_9.
Full textChowdhuri, Rajib, and Mrinal Kanti Deb Barma. "A Review on Coverage and Connectivity Through Random Deployment of Nodes in Wireless Sensor Network." In Advances in Computational Intelligence, Security and Internet of Things. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3666-3_20.
Full textKhan, Asfandyar, Azween Abdullah, and Nurul Hasan. "Event Based Data Gathering in Wireless Sensor Networks." In Wireless Sensor Networks and Energy Efficiency. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0101-7.ch021.
Full textOrtmann, Steffen, Michael Maaser, and Peter Langendoerfer. "Self-Adapting Event Configuration in Ubiquitous Wireless Sensor Networks." In Technological Innovations in Adaptive and Dependable Systems. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0255-7.ch007.
Full textConference papers on the topic "Wireless fire security sensor nodes"
Bhat, Abhijith, Achyuta V. Bhardwaj, Nishanth S. Kotian, and Smitha G. Prabhu. "Efficient Real-Time Monitoring and Fire Prevention Strategies in Bord-and-Pillar Coal Mines Utilizing Wireless Sensor Networks." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10690931.
Full textAsha Rani, M., and H. R. Roopashree. "Enhancing Wireless sensor network security with Trust-aware Routing protocol(TRP)Based on packet Forwarding Ratio Analysis to detect malicious nodes." In 2024 International Conference on Knowledge Engineering and Communication Systems (ICKECS). IEEE, 2024. http://dx.doi.org/10.1109/ickecs61492.2024.10616466.
Full textDavis, Jesse, and Nina Berry. "A modular architecture for wireless sensor network nodes." In Defense and Security, edited by Edward M. Carapezza. SPIE, 2004. http://dx.doi.org/10.1117/12.542850.
Full textPazynyuk, Tamara, Jian-Zhong Li, and George S. Oreku. "Mathematical model for wireless sensor nodes security." In 2008 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2008. http://dx.doi.org/10.1109/icmlc.2008.4620607.
Full textIwendi, C. O., and A. R. Allen. "Enhanced security technique for wireless sensor network nodes." In IET Conference on Wireless Sensor Systems (WSS 2012). IET, 2012. http://dx.doi.org/10.1049/cp.2012.0610.
Full textDu, Qiao-Ling, Zhi-Hong Qian, Hong Jiang, and Shu-Xun Wang. "Localization of Anchor Nodes for Wireless Sensor Networks." In 2008 New Technologies, Mobility and Security (NTMS). IEEE, 2008. http://dx.doi.org/10.1109/ntms.2008.ecp.57.
Full textMohapatra, Santoshinee, and Pabitra Mohan Khilar. "Forest fire monitoring and detection of faulty nodes using wireless sensor network." In TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7848647.
Full textSt. Pierre, Joseph, and Howard E. Michel. "Development of an intelligent wireless sensor network with mobile nodes." In SPIE Defense, Security, and Sensing, edited by Stephen Mott, John F. Buford, Gabe Jakobson, and Michael J. Mendenhall. SPIE, 2009. http://dx.doi.org/10.1117/12.818874.
Full textBack, Jason M., Steven D. Beck, Mark A. Frank, and Eric Hoenes. "Air launch wireless sensor nodes (ALSN) for battle damage assessment (BDA)." In Defense and Security Symposium, edited by Edward M. Carapezza. SPIE, 2006. http://dx.doi.org/10.1117/12.665058.
Full textYang, Chaoqun, Xiangyu Li, Yongchang Liu, and Shujuan Yin. "Risk-Aware Leakage Resiliency for Wireless Sensor Network Nodes." In 2017 13th International Conference on Computational Intelligence and Security (CIS). IEEE, 2017. http://dx.doi.org/10.1109/cis.2017.00068.
Full text