Journal articles on the topic 'Wireless fire security sensor nodes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Wireless fire security sensor nodes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
S.R, Vijayalakshmi, and Muruganand S. "Design Challenges in Wireless Fire Security Sensor Nodes." International Journal of Embedded Systems and Applications 5, no. 2 (2015): 31–44. http://dx.doi.org/10.5121/ijesa.2015.5203.
Full textShabnam, Kumari, Dalal Sumit, and Rashmi. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 477–83. https://doi.org/10.31142/ijtsrd12931.
Full textDora, Jean Rosemond, and Karol Nemoga. "Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks." Journal of Cybersecurity and Privacy 1, no. 4 (2021): 553–79. http://dx.doi.org/10.3390/jcp1040028.
Full textRB, Dayananda, G.Manoj Someswar, and T.P. Suryachandra Rao. "Secure Data Sharing with ABE in Wireless Sensor Networks." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 02 (2015): 1523–33. https://doi.org/10.5281/zenodo.14770379.
Full textNamboodiri, Vinod, and Abtin Keshavarzian. "Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks." Journal of Computer Networks and Communications 2011 (2011): 1–19. http://dx.doi.org/10.1155/2011/195685.
Full textU, Maheswaran, Bhuvaneeshwaran V, Hemanathan M, and Jawahar K. "IoT Based coal mine safety monitoring and controlling." Journal of University of Shanghai for Science and Technology 23, no. 07 (2021): 1205–9. http://dx.doi.org/10.51201/jusst/21/07287.
Full textSree Ranjani, N. Y., A. G. Ananth, and L. Sudershan Reddy. "A Firebug Optimal Cluster based Data Aggregation for Healthcare Application." IOP Conference Series: Earth and Environmental Science 1057, no. 1 (2022): 012006. http://dx.doi.org/10.1088/1755-1315/1057/1/012006.
Full textMin, Jie, Junbin Liang, Xingpo Ma, and Hongling Chen. "STQ-SCS: An Efficient and Secure Scheme for Fine-Grained Spatial-Temporal Top- k Query in Fog-Based Mobile Sensor-Cloud Systems." Security and Communication Networks 2021 (May 28, 2021): 1–16. http://dx.doi.org/10.1155/2021/9939796.
Full textHussein, Safwan Mawlood, Juan Antonio López Ramos, and Abubakar Muhammad Ashir. "A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks." Electronics 11, no. 17 (2022): 2721. http://dx.doi.org/10.3390/electronics11172721.
Full textChen, Hongsong, and Zhongchuan Fu. "Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/852173.
Full textOrtmann, Steffen, Michael Maaser, and Peter Langendoerfer. "Self-Adapting Event Configuration in Ubiquitous Wireless Sensor Networks." International Journal of Adaptive, Resilient and Autonomic Systems 1, no. 2 (2010): 46–63. http://dx.doi.org/10.4018/jaras.2010040104.
Full textYe-lim, Kang, and Cho Tae-ho. "Fuzzy-based Dynamic Security Parameters Determination Method to Improve Energy Efficiency." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 1952–58. https://doi.org/10.35940/ijeat.D9024.049420.
Full textA. Rukmani and C. Jayanthi. "Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks." Scientific Temper 15, spl-1 (2024): 275–82. https://doi.org/10.58414/scientifictemper.2024.15.spl.32.
Full textHuy, Long Tran, Chinh Tran Thien, Hoai Trung Tran, and Quynh Le Chi. "Monitoring, Detecting and Early Warning of Forest Fires using Blockchain in Wireless Sensor Network." International Journal of Computer Science and Mobile Computing 11, no. 11 (2022): 165–76. http://dx.doi.org/10.47760/ijcsmc.2022.v11i11.013.
Full textLiu, Kaijun, Qiang Cao, Guosheng Xu, and Guoai Xu. "Fine-Auth: A Fine-Grained User Authentication and Key Agreement Protocol Based on Physical Unclonable Functions for Wireless Body Area Networks." Applied Sciences 13, no. 22 (2023): 12376. http://dx.doi.org/10.3390/app132212376.
Full textChittibabu, Y., CH Anuradha, and Sri Rama Chandra P. Murty. "Fuzzy Trust Based Energy Aware Multipath Secure Data Collection in Wireless Sensor Network." Journal of Computational and Theoretical Nanoscience 16, no. 2 (2019): 669–75. http://dx.doi.org/10.1166/jctn.2019.7788.
Full textArachchige, Kithmini Godewatte, Philip Branch, and Jason But. "Evaluation of Correlation between Temperature of IoT Microcontroller Devices and Blockchain Energy Consumption in Wireless Sensor Networks." Sensors 23, no. 14 (2023): 6265. http://dx.doi.org/10.3390/s23146265.
Full textVimal, S1 Vijayalakshmi V2. "SURVEY: COMPARISON OF PEER-TO-PEER OVERLAY NETWORK FOR FILE SEARCHING AND SHARING METHODS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 1 (2018): 338–43. https://doi.org/10.5281/zenodo.1147478.
Full textEbobissé Djéné, Yves Frédéric Ebobissé, Mohammed Sbai El El Idrissi, Pierre-Martin Tardif, Ali Jorio, Brahim El El Bhiri, and Youssef Fakhri. "A Formal Energy Consumption Analysis to Secure Cluster-Based WSN: A Case Study of Multi-Hop Clustering Algorithm Based on Spectral Classification Using Lightweight Blockchain." Sensors 22, no. 20 (2022): 7730. http://dx.doi.org/10.3390/s22207730.
Full textYe-lim, Kang, and Cho Tae-ho. "Simulation of a Fine Dust Value-Based False Data Detection System to Improve Security In WSN-Based Air Purification IoT." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 6 (2021): 148–53. https://doi.org/10.35940/ijeat.F3077.0810621.
Full textEt. al., Dr B. Shadaksharappa,. "Attack Prediction By Using Greedy Algorithm For Diminishing The Drop And Delay In Wireless Sensor Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1072–82. http://dx.doi.org/10.17762/turcomat.v12i6.2425.
Full textKang, Ye-lim, and Tae-ho Cho. "Simulation of a Fine Dust Value-Based False Data Detection System to Improve Security In WSN-Based Air Purification IoT." International Journal of Engineering and Advanced Technology 10, no. 6 (2021): 148–53. http://dx.doi.org/10.35940/ijeat.f3077.0810621.
Full textSamijayani, Octarina Nur, and Ibnu Fauzi. "Perancangan Smart Home Berbasis Jaringan Sensor Nirkabel." JURNAL Al-AZHAR INDONESIA SERI SAINS DAN TEKNOLOGI 3, no. 2 (2017): 76. http://dx.doi.org/10.36722/sst.v3i2.188.
Full textHe, Jingsha, Jing Xu, Xingye Zhu, Yuqiang Zhang, Ting Zhang, and Wanqing Fu. "Reputation-Based Secure Sensor Localization in Wireless Sensor Networks." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/308341.
Full textRahiman, Amir Rizaan, Temitope Betty Williams, and Muhammad D. Zakaria. "Fine-tuning approach in metaheuristic algorithm to prolong wireless sensor networks nodes lifetime." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (2022): 365. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp365-374.
Full textBai, Zhan Yuan, and Ai Dong Xu. "Design of Video Sensor Based on Wireless Sensor Networks." Advanced Materials Research 159 (December 2010): 568–71. http://dx.doi.org/10.4028/www.scientific.net/amr.159.568.
Full textLi, Qiangyi, and Ningzhong Liu. "Coverage Blind Area Repair Based on Perceived Multimedia Data Driven in Mobile Wireless Sensor Networks." Advances in Multimedia 2022 (April 12, 2022): 1–10. http://dx.doi.org/10.1155/2022/2354024.
Full textEl Zouka, Hesham A. "An Adaptable Security Framework for Wireless Sensor Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (2014): 4898–906. http://dx.doi.org/10.24297/ijct.v13i9.2390.
Full textDíaz, Álvaro, Javier González-Bayon, and Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator." Journal of Circuits, Systems and Computers 25, no. 07 (2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.
Full textM.Raju and Dr.K.P.Lochanambal. "A Novel Security Framework: Trust based routing for Wireless Sensor Network." international journal of engineering technology and management sciences 7, no. 5 (2023): 284–92. http://dx.doi.org/10.46647/ijetms.2023.v07i05.033.
Full textZhang, Yu Quan. "A Novel Key Management Strategy for Heterogeneous Wireless Sensor Networks." Advanced Materials Research 818 (September 2013): 224–29. http://dx.doi.org/10.4028/www.scientific.net/amr.818.224.
Full textDener, Murat. "Comparison of Encryption Algorithms in Wireless Sensor Networks." ITM Web of Conferences 22 (2018): 01005. http://dx.doi.org/10.1051/itmconf/20182201005.
Full textSehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Analysis of AODV protocol under sinkhole attack in wireless sensor network." International Journal of Engineering & Technology 7, no. 2.4 (2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.4.13028.
Full textSaida, Angotu, Ch Sreedhar, Samreen, Aleem Mohamma, K. Jamal, and Manish Ghalwan. "LORA Based Forest Fire Monitoring System." E3S Web of Conferences 430 (2023): 01171. http://dx.doi.org/10.1051/e3sconf/202343001171.
Full textABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.
Full textBahae, Abidi, Jilbab Abdelillah, and El Haziti Mohamed. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13–18. https://doi.org/10.11591/ijict.v8i1.pp13-18.
Full textShaik, Riaz, and Shaik Shakeel Ahamad. "Security Attacks and Challenges of Wireless Sensor Network’s -a Review." International Journal of Engineering & Technology 7, no. 2.32 (2018): 136. http://dx.doi.org/10.14419/ijet.v7i2.32.15387.
Full textAnil, Dattatraya Nimbalkar, Ali Azmat, and Y. M. Patil. "Security issues in wireless sensor networks." i-manager’s Journal on Wireless Communication Networks 11, no. 2 (2023): 32. http://dx.doi.org/10.26634/jwcn.11.2.19780.
Full textPadmavathi, V. "A survey on network admission control solution in 6LoWPAN using cryptographic mechanism." i-manager's Journal on Communication Engineering and Systems 12, no. 2 (2023): 25. http://dx.doi.org/10.26634/jcs.12.2.20413.
Full textMinakshi, Sharma*, Kalra Sakshi, and Monga Chanda. "A SURVAY ON SECURITY ISSUES AND ATTACKS IN WIRELESS SENSOR NETWORK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 563–67. https://doi.org/10.5281/zenodo.48314.
Full textMaksimovic, Mirjana, and Vladimir Milosevic. "Evaluating the optimal sensor placement for smoke detection." Yugoslav Journal of Operations Research 26, no. 1 (2016): 33–50. http://dx.doi.org/10.2298/yjor140312002m.
Full textLi, Chaoran, and Yun Liu. "SRDA: Smart Reputation-Based Data Aggregation Protocol for Wireless Sensor Network." International Journal of Distributed Sensor Networks 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/105364.
Full textZhang, Jiang, and Qi Liu. "New key management scheme lattice-based for clustered wireless sensor networks." PLOS ONE 18, no. 8 (2023): e0290323. http://dx.doi.org/10.1371/journal.pone.0290323.
Full textWang, Shanshan, and Yun Chen. "Optimization of Wireless Sensor Network Architecture with Security System." Journal of Sensors 2021 (November 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/7886639.
Full textThangamuthu, A. P. "A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks." Shanlax International Journal of Arts, Science and Humanities 9, no. 2 (2021): 26–34. http://dx.doi.org/10.34293/sijash.v9i2.4159.
Full textKaur, Simerpreet, Md Ataullah, and Monika Garg. "Security from Denial of Sleep Attack in Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 419–25. http://dx.doi.org/10.24297/ijct.v4i2b1.3230.
Full textLu, Yao, Shuo Cheng, Xiaofei Zhu, and Geon Seok Yang. "Construction of Landscape Ecological Planning Evaluation Model Based on Sensor Network." Journal of Sensors 2022 (September 27, 2022): 1–10. http://dx.doi.org/10.1155/2022/2989351.
Full textZheng, Yan Hua. "A Research on Key Management in Wireless Sensor Networks." Applied Mechanics and Materials 303-306 (February 2013): 247–50. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.247.
Full textSeidu, Rafiw, Abdul-Mumin Selanwiah Salifu, and Johnbosco A. K. Ansuura. "A Genetic Algorithm with a Trust Model Function for Detecting Sinkhole and Wormhole Nodes in Wireless Sensor Networks." Transactions on Engineering and Computing Sciences 12, no. 4 (2024): 30–44. https://doi.org/10.14738/tecs.124.17242.
Full textZhang, Ke. "A wormhole attack detection method for tactical wireless sensor networks." PeerJ Computer Science 9 (August 29, 2023): e1449. http://dx.doi.org/10.7717/peerj-cs.1449.
Full text