To see the other types of publications on this topic, follow the link: Wireless fire security sensor nodes.

Journal articles on the topic 'Wireless fire security sensor nodes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Wireless fire security sensor nodes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

S.R, Vijayalakshmi, and Muruganand S. "Design Challenges in Wireless Fire Security Sensor Nodes." International Journal of Embedded Systems and Applications 5, no. 2 (2015): 31–44. http://dx.doi.org/10.5121/ijesa.2015.5203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shabnam, Kumari, Dalal Sumit, and Rashmi. "A Study on Security in Wireless Sensor Networks." International Journal of Trend in Scientific Research and Development 2, no. 4 (2018): 477–83. https://doi.org/10.31142/ijtsrd12931.

Full text
Abstract:
Wireless Sensor Networks WSNs present myriad application opportunities for several applications such as precision agriculture, environmental and habitat monitoring, traffic control, industrial process monitoring and control, home automation and mission critical surveillance applications such as military surveillance, healthcare elderly, home monitoring applications, disaster relief and management, fire detection applications among others. Since WSNs are used in mission critical tasks, security is an essential requirement. Sensor nodes can easily be compromised by an adversary due to unique con
APA, Harvard, Vancouver, ISO, and other styles
3

Dora, Jean Rosemond, and Karol Nemoga. "Clone Node Detection Attacks and Mitigation Mechanisms in Static Wireless Sensor Networks." Journal of Cybersecurity and Privacy 1, no. 4 (2021): 553–79. http://dx.doi.org/10.3390/jcp1040028.

Full text
Abstract:
The development of the wireless sensor networks technology commonly named WSNs has been gaining a significantly increased amount of attention from researchers over the last few decades. Its large number of sensor nodes is one of the features that makes it beneficial to the technology. The sensors can communicate with each other to form a network. These sensor nodes are generally used for diverse applications, such as pressure monitoring, fire detection, target tracking, and health monitoring, etc. However, the downside is that WSNs are often deployed in hostile, critical environments where the
APA, Harvard, Vancouver, ISO, and other styles
4

RB, Dayananda, G.Manoj Someswar, and T.P. Suryachandra Rao. "Secure Data Sharing with ABE in Wireless Sensor Networks." COMPUSOFT: An International Journal of Advanced Computer Technology 04, no. 02 (2015): 1523–33. https://doi.org/10.5281/zenodo.14770379.

Full text
Abstract:
This research paper addresses the issue of secure data sharing for distributed data storage in Wireless Sensor Networks (WSNs). In WSNs, storing data at local sensor nodes or at designated in-network nodes greatly saves the network-wide communication load and has a lot of benefits such as energy-efficiency. However, unattended wireless sensor nodes are very likely subject to strong attacks such as physical compromise. In this sense a storage node in WSNs can be viewed as an untrusted storage since the owner of the WSN may have concerns on data security in mission-critical applications if data
APA, Harvard, Vancouver, ISO, and other styles
5

Namboodiri, Vinod, and Abtin Keshavarzian. "Alert: An Adaptive Low-Latency Event-Driven MAC Protocol for Wireless Sensor Networks." Journal of Computer Networks and Communications 2011 (2011): 1–19. http://dx.doi.org/10.1155/2011/195685.

Full text
Abstract:
Collection of rare but delay-critical messages from a group of sensor nodes is a key process in many wireless sensor network applications. This is particularly important for security-related applications like intrusion detection and fire alarm systems. An event sensed by multiple sensor nodes in the network can trigger many messages to be sent simultaneously. We present Alert, a MAC protocol for collecting event-triggered urgent messages from a group of sensor nodes with minimum latency and without requiring any cooperation or prescheduling among the senders or between senders and receiver dur
APA, Harvard, Vancouver, ISO, and other styles
6

U, Maheswaran, Bhuvaneeshwaran V, Hemanathan M, and Jawahar K. "IoT Based coal mine safety monitoring and controlling." Journal of University of Shanghai for Science and Technology 23, no. 07 (2021): 1205–9. http://dx.doi.org/10.51201/jusst/21/07287.

Full text
Abstract:
Many coal miners are concerned about their safety in the workplace. Within subsurface mines, poor ventilation exposes workers to toxic gases, heat, and dust, which can lead to sickness, injury, and death. With the aid of an ARM controller, this work proposes a concept for an Internet of things (IoT), wireless sensor network (WSN) that can track temperature, humidity, and gas in an underground mine. This device uses a low-power, less-cost Arduino UNO, Node MCU, DHT11 sensor, gas sensor, fire sensor to detect fire and send an alarm, and LDR to detect light depending on light levels. Conventional
APA, Harvard, Vancouver, ISO, and other styles
7

Sree Ranjani, N. Y., A. G. Ananth, and L. Sudershan Reddy. "A Firebug Optimal Cluster based Data Aggregation for Healthcare Application." IOP Conference Series: Earth and Environmental Science 1057, no. 1 (2022): 012006. http://dx.doi.org/10.1088/1755-1315/1057/1/012006.

Full text
Abstract:
Abstract Majority of Wireless Sensor Networks (WSNs) are made up of huge sensor nodes with minimum cost, processing, communication capability and limited sensing. Because sensor nodes have limited resources, it’s critical to enhance bandwidth utilization, network lifetime and minimize the data transmission. The term data aggregation defines the method of integrating the sensor data to minimize the data transmission. However, WSN-based healthcare applications face privacy, and security concerns. In this paper design of a Fire Bug Swarm Optimal Cluster-Based Data Aggregation (FSOCDA) in WSN has
APA, Harvard, Vancouver, ISO, and other styles
8

Min, Jie, Junbin Liang, Xingpo Ma, and Hongling Chen. "STQ-SCS: An Efficient and Secure Scheme for Fine-Grained Spatial-Temporal Top- k Query in Fog-Based Mobile Sensor-Cloud Systems." Security and Communication Networks 2021 (May 28, 2021): 1–16. http://dx.doi.org/10.1155/2021/9939796.

Full text
Abstract:
With the emergence of the fog computing and the sensor-cloud computing paradigms, end users can retrieve the desired sensory data generated by any wireless sensor network (WSN) in a fog-based sensor-cloud system transparently. However, the fog nodes and the cloud servers may suffer from many kinds of attacks on the Internet and become semitrusted, which threatens the security of query processing in the system. In this paper, we investigated the problem of secure, fine-grained spatial-temporal Top- k query in fog-based mobile sensor-cloud systems (FMSCSs) and proposed a novel scheme named STQ-S
APA, Harvard, Vancouver, ISO, and other styles
9

Hussein, Safwan Mawlood, Juan Antonio López Ramos, and Abubakar Muhammad Ashir. "A Secure and Efficient Method to Protect Communications and Energy Consumption in IoT Wireless Sensor Networks." Electronics 11, no. 17 (2022): 2721. http://dx.doi.org/10.3390/electronics11172721.

Full text
Abstract:
The rapid growth of technology has resulted in the deployment of a large number of interconnected devices, resulting in a wide range of new societal services. Wireless sensor networks (WSNs) are a promising technology which is faced with the challenges of operating a large number of sensor nodes, information gathering, data transmission, and providing a means to act in different scenarios such as monitoring, surveillance, forest fire detection, and many others from the civil to military spectrum. The deployment scenario, the nature of the sensor-equipped nodes, and their communication methods
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Hongsong, and Zhongchuan Fu. "Hadoop-Based Healthcare Information System Design and Wireless Security Communication Implementation." Mobile Information Systems 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/852173.

Full text
Abstract:
Human health information from healthcare system can provide important diagnosis data and reference to doctors. However, continuous monitoring and security storage of human health data are challenging personal privacy and big data storage. To build secure and efficient healthcare application, Hadoop-based healthcare security communication system is proposed. In wireless biosensor network, authentication and key transfer should be lightweight. An ECC (Elliptic Curve Cryptography) based lightweight digital signature and key transmission method are proposed to provide wireless secure communication
APA, Harvard, Vancouver, ISO, and other styles
11

Ortmann, Steffen, Michael Maaser, and Peter Langendoerfer. "Self-Adapting Event Configuration in Ubiquitous Wireless Sensor Networks." International Journal of Adaptive, Resilient and Autonomic Systems 1, no. 2 (2010): 46–63. http://dx.doi.org/10.4018/jaras.2010040104.

Full text
Abstract:
Wireless Sensor Networks are the key-enabler for low cost ubiquitous applications in the area of homeland security, health-care, and environmental monitoring. A necessary prerequisite is reliable and efficient event detection in spite of sudden failures and environmental changes. Due to the fact that the sensors need to be low cost, they have only scarce resources leading to a certain level of failures of sensor nodes or sensing devices attached to the nodes. Available fault tolerant solutions are mainly customized approaches that revealed several shortcomings, particularly in adaptability and
APA, Harvard, Vancouver, ISO, and other styles
12

Ye-lim, Kang, and Cho Tae-ho. "Fuzzy-based Dynamic Security Parameters Determination Method to Improve Energy Efficiency." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 1952–58. https://doi.org/10.35940/ijeat.D9024.049420.

Full text
Abstract:
Fine dust is a harmful substance that floats in the atmosphere. It is not filtered well in the bronchus and causes health problems when it accumulates in the body. Fine dust that is present in the air outside can flow into buildings through windows and other openings, adversely affecting indoor air quality. It has negative health effects on people who live indoors. As attention to problems associated with fine dust gradually rises, the importance of continuously managing the quality of indoor air through air purification rises. Therefore, recently, research and development into systems to peri
APA, Harvard, Vancouver, ISO, and other styles
13

A. Rukmani and C. Jayanthi. "Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks." Scientific Temper 15, spl-1 (2024): 275–82. https://doi.org/10.58414/scientifictemper.2024.15.spl.32.

Full text
Abstract:
Wireless sensor networks (WSNs) are pivotal in various applications, ranging from environmental monitoring to military operations. However, their susceptibility to security threats, particularly from malicious nodes, poses significant challenges to network integrity and data reliability. This paper proposes an innovative methodology that integrates clustering with an optimization approach to effectively identify and mitigate malicious nodes in WSNs. In the proposed methodology, the network is divided into clusters, each managed by a cluster head responsible for monitoring the behavior of nodes
APA, Harvard, Vancouver, ISO, and other styles
14

Huy, Long Tran, Chinh Tran Thien, Hoai Trung Tran, and Quynh Le Chi. "Monitoring, Detecting and Early Warning of Forest Fires using Blockchain in Wireless Sensor Network." International Journal of Computer Science and Mobile Computing 11, no. 11 (2022): 165–76. http://dx.doi.org/10.47760/ijcsmc.2022.v11i11.013.

Full text
Abstract:
Forest fires cause economic and material losses and destroy the environment, causing many negative impacts on human habitats and forest ecosystems. The unpredictable threat of wildfires leads to climate change and the greenhouse effect. It is worth noting that up to 90% of forest fires occur mainly due to human activities [1], even due to tampering, vandalism, and hostile actions. Therefore, to minimize the destruction caused by forest fires as well as accurately identify the area where forest fires occur and support government agencies, forest rangers, and search and disaster relief forces, .
APA, Harvard, Vancouver, ISO, and other styles
15

Liu, Kaijun, Qiang Cao, Guosheng Xu, and Guoai Xu. "Fine-Auth: A Fine-Grained User Authentication and Key Agreement Protocol Based on Physical Unclonable Functions for Wireless Body Area Networks." Applied Sciences 13, no. 22 (2023): 12376. http://dx.doi.org/10.3390/app132212376.

Full text
Abstract:
Wireless body area networks (WBANs) can be used to realize the real-time monitoring and transmission of health data concerning the human body based on wireless communication technology. With the transmission of these sensitive health data, security and privacy protection issues have become increasingly prominent. Fine-grained authentication allows physicians to run authentication checks of another specific entity according to their identifying attributes. Hence, it plays a key role in preserving the security and privacy of WBANs. In recent years, substantial research has been carried out on fi
APA, Harvard, Vancouver, ISO, and other styles
16

Chittibabu, Y., CH Anuradha, and Sri Rama Chandra P. Murty. "Fuzzy Trust Based Energy Aware Multipath Secure Data Collection in Wireless Sensor Network." Journal of Computational and Theoretical Nanoscience 16, no. 2 (2019): 669–75. http://dx.doi.org/10.1166/jctn.2019.7788.

Full text
Abstract:
Wireless Sensor Network (WSN) is the most promising inventions that can find its application in diverse fields such as army surveillance and forest fire detection. Multi-hop routing is followed in WSN, and the greatest security with effect to identity deception is produced through replaying routing information. An inevitable role is played by trust in the sensor network in case of military and other applications. Serious research work is being conducted on secured data aggregation. Longestablished cryptographic trust-aware routing protocols which are being used currently have become outdated,
APA, Harvard, Vancouver, ISO, and other styles
17

Arachchige, Kithmini Godewatte, Philip Branch, and Jason But. "Evaluation of Correlation between Temperature of IoT Microcontroller Devices and Blockchain Energy Consumption in Wireless Sensor Networks." Sensors 23, no. 14 (2023): 6265. http://dx.doi.org/10.3390/s23146265.

Full text
Abstract:
Blockchain technology is an information security solution that operates on a distributed ledger system. Blockchain technology has considerable potential for securing Internet of Things (IoT) low-powered devices. However, the integration of IoT and blockchain technologies raises a number of research issues. One of the most important is the energy consumption of different blockchain algorithms. Because IoT devices are typically low-powered battery-powered devices, the energy consumption of any blockchain node must be kept low. IoT end nodes are typically low-powered devices expected to survive f
APA, Harvard, Vancouver, ISO, and other styles
18

Vimal, S1 Vijayalakshmi V2. "SURVEY: COMPARISON OF PEER-TO-PEER OVERLAY NETWORK FOR FILE SEARCHING AND SHARING METHODS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 1 (2018): 338–43. https://doi.org/10.5281/zenodo.1147478.

Full text
Abstract:
The infrastructure of Peer to Peer network is underlying on the network flows and end host. The overlay network forecasting the numerical performance of the network and it can improve the connection between the neighbor’s nodes via proper routers. The performance of the overlay network is calculated by the amount of failure and success rate of the file sharing and improves the performance in the good usage of resources. We examine the peer to peer overlays networks by different networks similar by ad-hoc networks, sensor networks and Wireless LANs. This survey provides the features of P2
APA, Harvard, Vancouver, ISO, and other styles
19

Ebobissé Djéné, Yves Frédéric Ebobissé, Mohammed Sbai El El Idrissi, Pierre-Martin Tardif, Ali Jorio, Brahim El El Bhiri, and Youssef Fakhri. "A Formal Energy Consumption Analysis to Secure Cluster-Based WSN: A Case Study of Multi-Hop Clustering Algorithm Based on Spectral Classification Using Lightweight Blockchain." Sensors 22, no. 20 (2022): 7730. http://dx.doi.org/10.3390/s22207730.

Full text
Abstract:
Wireless Sensors Networks are integrating human daily life at a fast rate. Applications cover a wide range of fields, including home security, agriculture, climate change, fire prevention, and so on and so forth. If WSN were initially flat networks, hierarchical, or cluster-based networks have been introduced in order to achieve a better performance in terms of energy efficiency, topology management, delay minimization, load balancing, routing techniques, etc. As cluster-based algorithms proved to be efficient in terms of energy balancing, security has been of less importance in the field. Dat
APA, Harvard, Vancouver, ISO, and other styles
20

Ye-lim, Kang, and Cho Tae-ho. "Simulation of a Fine Dust Value-Based False Data Detection System to Improve Security In WSN-Based Air Purification IoT." International Journal of Engineering and Advanced Technology (IJEAT) 10, no. 6 (2021): 148–53. https://doi.org/10.35940/ijeat.F3077.0810621.

Full text
Abstract:
Fine dust refers to harmful substances floating in the air. It is divided into PM 2.5 and PM 10, and has the characteristic that the particles are small enough to be invisible to the naked eye. When fine dust enters a room, it can enter the human body through the bronchi and cause lung or respiratory diseases. To solve the health problems caused by fine dust, research and development about various air purification systems are progressing. In this paper, we introduce a Wireless Sensor Networks (WSNs)-based Internet of Things (IoT) air purification system. This WSNs-based IoT air purification sy
APA, Harvard, Vancouver, ISO, and other styles
21

Et. al., Dr B. Shadaksharappa,. "Attack Prediction By Using Greedy Algorithm For Diminishing The Drop And Delay In Wireless Sensor Networks." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (2021): 1072–82. http://dx.doi.org/10.17762/turcomat.v12i6.2425.

Full text
Abstract:
The essential constraint of the internet is that forwarding the data packets of data among the restricted and trustworthy data nodes. If the receiver node is attacker node then it'll drop the data rather than forwarding the data to ensuing neighbor node. Therefore, efficient and secure data transmission is extremely necessary within the network data transmission. Each router node within the network can accept the data packets up to its buffer size only. Once the queue value reached the buffer threshold value then congestion can occur at the node. Once congestion happens then it would lose the
APA, Harvard, Vancouver, ISO, and other styles
22

Kang, Ye-lim, and Tae-ho Cho. "Simulation of a Fine Dust Value-Based False Data Detection System to Improve Security In WSN-Based Air Purification IoT." International Journal of Engineering and Advanced Technology 10, no. 6 (2021): 148–53. http://dx.doi.org/10.35940/ijeat.f3077.0810621.

Full text
Abstract:
Fine dust refers to harmful substances floating in the air. It is divided into PM 2.5 and PM 10, and has the characteristic that the particles are small enough to be invisible to the naked eye. When fine dust enters a room, it can enter the human body through the bronchi and cause lung or respiratory diseases. To solve the health problems caused by fine dust, research and development about various air purification systems are progressing. In this paper, we introduce a Wireless Sensor Networks (WSNs)-based Internet of Things (IoT) air purification system. This WSNs-based IoT air purification sy
APA, Harvard, Vancouver, ISO, and other styles
23

Samijayani, Octarina Nur, and Ibnu Fauzi. "Perancangan Smart Home Berbasis Jaringan Sensor Nirkabel." JURNAL Al-AZHAR INDONESIA SERI SAINS DAN TEKNOLOGI 3, no. 2 (2017): 76. http://dx.doi.org/10.36722/sst.v3i2.188.

Full text
Abstract:
<p><em>Abstrak</em> - <strong>Keamanan rumah menjadi hal yang sangat penting ketika pemilik rumah meninggalkan rumah dalam keadaan kosong. Selain pencurian, kebakaran juga merupakan masalah yang sering kali terjadi ketika rumah ditinggal pemiliknya. Sebagai alternatif solusi untuk menjaga dan mengawasi rumah yang diajukan pada penelitian ini ialah menggunakan teknologi Jaringan Sensor Nirkabel yang terintegrasi dengan jaringan internet, sehingga pemilik rumah tetap dapat mengawasi keadaan rumah dari jarak jauh. Pada penelitian ini dirancang prototype sistem rumah pintar
APA, Harvard, Vancouver, ISO, and other styles
24

He, Jingsha, Jing Xu, Xingye Zhu, Yuqiang Zhang, Ting Zhang, and Wanqing Fu. "Reputation-Based Secure Sensor Localization in Wireless Sensor Networks." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/308341.

Full text
Abstract:
Location information of sensor nodes in wireless sensor networks (WSNs) is very important, for it makes information that is collected and reported by the sensor nodes spatially meaningful for applications. Since most current sensor localization schemes rely on location information that is provided by beacon nodes for the regular sensor nodes to locate themselves, the accuracy of localization depends on the accuracy of location information from the beacon nodes. Therefore, the security and reliability of the beacon nodes become critical in the localization of regular sensor nodes. In this paper
APA, Harvard, Vancouver, ISO, and other styles
25

Rahiman, Amir Rizaan, Temitope Betty Williams, and Muhammad D. Zakaria. "Fine-tuning approach in metaheuristic algorithm to prolong wireless sensor networks nodes lifetime." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (2022): 365. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp365-374.

Full text
Abstract:
Wireless sensor networks (WSN) have evolved a vibrant and lively research field. It comprises numerous wise and low-power consumption devices for gathering the contiguous atmosphere's data. However, the energy dissipation matter that distorts network lifetime remains the challenge since the sensor node battery is non-rechargeable and irreplaceable. Clustering and routing protocol has become the furthermost solutions and invariably minimizes depletion and prolongs the sensor node lifetime. Such protocols have adopted metaheuristic algorithms to secure the efficiency of the clustering and routin
APA, Harvard, Vancouver, ISO, and other styles
26

Bai, Zhan Yuan, and Ai Dong Xu. "Design of Video Sensor Based on Wireless Sensor Networks." Advanced Materials Research 159 (December 2010): 568–71. http://dx.doi.org/10.4028/www.scientific.net/amr.159.568.

Full text
Abstract:
Introduces a wireless video sensor, which is based on wireless sensor networks technique. It can be widely used including battlefield intelligence, security monitoring, and environmental tracking. The Zigbee communication protocols is based on the IEEE 802.15.4-2003 standard. With JPEG compression, the video can be transmitted through the low rate wireless network. Wireless video sensor nodes form mesh networks, and transmit video information to coordinator. The coordinator connects to monitor station, and the monitor software display the video from the nodes in the wireless networks.
APA, Harvard, Vancouver, ISO, and other styles
27

Li, Qiangyi, and Ningzhong Liu. "Coverage Blind Area Repair Based on Perceived Multimedia Data Driven in Mobile Wireless Sensor Networks." Advances in Multimedia 2022 (April 12, 2022): 1–10. http://dx.doi.org/10.1155/2022/2354024.

Full text
Abstract:
Wireless sensor networks deploy a large number of wireless sensor nodes in the monitoring area to complete the target monitoring task. The coverage effect is an important index to evaluate wireless sensor networks. The effect of network coverage is realized by the wireless sensor nodes deployed in the monitoring area, because the reasonable deployment of sensor nodes can affect the accuracy, reliability, real time, and integrity of monitoring target data collection. The main purpose of network coverage is to use the least number of wireless sensor nodes to complete the monitoring task of targe
APA, Harvard, Vancouver, ISO, and other styles
28

El Zouka, Hesham A. "An Adaptable Security Framework for Wireless Sensor Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (2014): 4898–906. http://dx.doi.org/10.24297/ijct.v13i9.2390.

Full text
Abstract:
The design of secure and survivable nodes is one of the most vital issues in designing energy-efficient protocols for wireless sensor network where the energy, memory and computational power of sensor nodes are limited. In this paper, some of the challenges facing the wireless sensor networks are discussed in attempting to prolong the battery lifetime of the nodes, and to secure the communication channel. While most of these attacks can be dealt with through cryptographic security protocols provided by key management schemes, there are always a few that manage to really cause problems. One s
APA, Harvard, Vancouver, ISO, and other styles
29

Díaz, Álvaro, Javier González-Bayon, and Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator." Journal of Circuits, Systems and Computers 25, no. 07 (2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.

Full text
Abstract:
Sensor nodes are low-power and low-cost devices with the requirement of a long autonomous lifetime. Therefore, the nodes have to use the available power carefully and avoid expensive computations or radio transmissions. In addition, as some wireless sensor networks (WSNs) process sensitive data, selecting a security protocol is vital. Cryptographic methods used in WSNs should fulfill the constraints of sensor nodes and should be evaluated for their security and power consumption. WSN engineers use several metrics to obtain estimations prior to network deployment. These metrics are usually rela
APA, Harvard, Vancouver, ISO, and other styles
30

M.Raju and Dr.K.P.Lochanambal. "A Novel Security Framework: Trust based routing for Wireless Sensor Network." international journal of engineering technology and management sciences 7, no. 5 (2023): 284–92. http://dx.doi.org/10.46647/ijetms.2023.v07i05.033.

Full text
Abstract:
Nowadays technology is growing very rapidly. The devices are becoming wireless. The telephones are gradually replaced by the mobile and wires are replaced by wireless devices. Even though there is advancement in technology, threats to security are also increasing. Since the medium is wireless, chances of eavesdropping is more and there is security issue of information being transmitted over wireless medium. The nodes can be compromised. The limitations of the nodes are low capacity of storage and lesser battery life. Hence, the security of the data being transmitted on the wireless medium is a
APA, Harvard, Vancouver, ISO, and other styles
31

Zhang, Yu Quan. "A Novel Key Management Strategy for Heterogeneous Wireless Sensor Networks." Advanced Materials Research 818 (September 2013): 224–29. http://dx.doi.org/10.4028/www.scientific.net/amr.818.224.

Full text
Abstract:
A key management strategy is presented for heterogeneous wireless sensor networks. The wireless sensor networks have some sensor nodes which have greater power and transmission capability than other nodes have. Both ordinary nodes and heterogeneous nodes are evenly distributed in sensing square area respectively. The pairwise keys between nodes are established through utilizing the concept of the overlap key sharing and the random key predistribution scheme. Analysis and comparison demonstrate that the connectivity and security of wireless sensor networks have been improved obviously even with
APA, Harvard, Vancouver, ISO, and other styles
32

Dener, Murat. "Comparison of Encryption Algorithms in Wireless Sensor Networks." ITM Web of Conferences 22 (2018): 01005. http://dx.doi.org/10.1051/itmconf/20182201005.

Full text
Abstract:
In general, Wireless Sensor Networks occur when sensor nodes are randomly left in an unreliable environment. Sensor node has limited processor, limited memory, limited radio capacity and low cost. In sensor network applications, security mechanisms must be used, because of unsafe environments, excessive number of sensor nodes, and wireless communication environments. Ensuring confidentiality, the primary goal of security, is one of the most important problems to be solved in order to realize time and vital objectives. While ensuring security, it is also necessary to consider other important cr
APA, Harvard, Vancouver, ISO, and other styles
33

Sehrawat, Harkesh, Yudhvir Singh, and Vikas Siwach. "Analysis of AODV protocol under sinkhole attack in wireless sensor network." International Journal of Engineering & Technology 7, no. 2.4 (2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.4.13028.

Full text
Abstract:
A Wireless Sensor Network (WSNs) is a collection of number of sensor nodes which are left open in an unsecured environment. Sensor nodes work and communicate together to attain the desired goals. They are placed at the locations where monitoring is otherwise impossible. Wireless Sensor Networks are resource constrained which may be computational power, memory capacity, battery power etc. As Wireless Sensor Networks are implemented in the unattended environment, they are prone to discrete type of security attacks. Because of their limitations these networks are easily targeted by intruders. Sin
APA, Harvard, Vancouver, ISO, and other styles
34

Saida, Angotu, Ch Sreedhar, Samreen, Aleem Mohamma, K. Jamal, and Manish Ghalwan. "LORA Based Forest Fire Monitoring System." E3S Web of Conferences 430 (2023): 01171. http://dx.doi.org/10.1051/e3sconf/202343001171.

Full text
Abstract:
The LoRa-based forest fire monitoring method by using wireless type networks is an IoT system designed to detect and prevent forest fires. The system consists of sensor nodes which are deployed throughout the forest to monitor various environmental conditions such as humidity, temperature, wind speed and direction. These sensor nodes are equipped with LoRa radios that enable them to communicate wirelessly with a central gateway. The Gateway gathers the data from the sensor nodes and transmits it to a server in the cloud for processing and analysis. The system utilizes machine learning algorith
APA, Harvard, Vancouver, ISO, and other styles
35

ABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.

Full text
Abstract:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between
APA, Harvard, Vancouver, ISO, and other styles
36

Bahae, Abidi, Jilbab Abdelillah, and El Haziti Mohamed. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13–18. https://doi.org/10.11591/ijict.v8i1.pp13-18.

Full text
Abstract:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between s
APA, Harvard, Vancouver, ISO, and other styles
37

Shaik, Riaz, and Shaik Shakeel Ahamad. "Security Attacks and Challenges of Wireless Sensor Network’s -a Review." International Journal of Engineering & Technology 7, no. 2.32 (2018): 136. http://dx.doi.org/10.14419/ijet.v7i2.32.15387.

Full text
Abstract:
Wireless sensor networks are becoming part of many of the research areas to address different issues related to technological and societal. So, The developments in wireless communication technology have made the deployment of wireless sensor nodes connected through wireless medium, known as wireless sensor networks. Wireless sensor networks have numerous applications in many fields like military , environmental monitoring , health , industry etc.. wireless sensor networks have more benefits over Wired networks .Though there are several advantages of wireless networks, they are prone to securit
APA, Harvard, Vancouver, ISO, and other styles
38

Anil, Dattatraya Nimbalkar, Ali Azmat, and Y. M. Patil. "Security issues in wireless sensor networks." i-manager’s Journal on Wireless Communication Networks 11, no. 2 (2023): 32. http://dx.doi.org/10.26634/jwcn.11.2.19780.

Full text
Abstract:
The main purpose of Wireless Sensor Networks (WSNs) is to collect data from unsafe environments. Almost all WSN security protocols assume that an adversary may gain complete control of a sensor node through direct physical access. As sensor networks emerge as a key technology in the future, researchers have faced a number of challenges. A wireless sensor network is made up of many tiny sensor nodes that operate independently and, in some cases, have no access to renewable energy sources. Additionally, as security is essential to the acceptability and use of sensor networks for a variety of app
APA, Harvard, Vancouver, ISO, and other styles
39

Padmavathi, V. "A survey on network admission control solution in 6LoWPAN using cryptographic mechanism." i-manager's Journal on Communication Engineering and Systems 12, no. 2 (2023): 25. http://dx.doi.org/10.26634/jcs.12.2.20413.

Full text
Abstract:
This paper introduces a robust network admission control (NAC) solution tailored specifically for 6LoWPAN Wireless Sensor Networks (WSN), aiming to enhance the overall security infrastructure. By implementing stringent measures, this solution not only safeguards legitimate nodes but also fortifies the network against potential security threats originating from unauthorized nodes attempting to communicate with both legitimate nodes and the Internet. The solution enhances security through innovative features for administrative nodes, including node presence detection and robust authentication. I
APA, Harvard, Vancouver, ISO, and other styles
40

Minakshi, Sharma*, Kalra Sakshi, and Monga Chanda. "A SURVAY ON SECURITY ISSUES AND ATTACKS IN WIRELESS SENSOR NETWORK." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 3 (2016): 563–67. https://doi.org/10.5281/zenodo.48314.

Full text
Abstract:
Wireless sensor network is the most growing technology for sensing and performing the different tasks. With the beginning of the internet, security has  become a major concern and the history of security allows a better understanding of the emergence of security technology. The intent of this paper is to consider the protection correlated issues and incitements in wireless sensor networks. We identify the security threats, appraisal anticipated security mechanisms for wireless sensor networks. The inclusion of wireless communication technology also incurs various types of security threats
APA, Harvard, Vancouver, ISO, and other styles
41

Maksimovic, Mirjana, and Vladimir Milosevic. "Evaluating the optimal sensor placement for smoke detection." Yugoslav Journal of Operations Research 26, no. 1 (2016): 33–50. http://dx.doi.org/10.2298/yjor140312002m.

Full text
Abstract:
Wireless Sensor Networks (WSNs) consist of wireless sensor nodes, where the choice of their deployment scheme depends highly on the type of sensors, their application, and the environment they will operate in. The performance of WSNs can be affected if the network is deployed under different topologies. In this paper various strategies for positioning nodes in WSNs for fire detection (grid, triangular and strip) are discussed. We propose the proper placement of the smoke sensors to satisfy two important network design objectives: to maximize the network lifetime after fire ignition, and to ach
APA, Harvard, Vancouver, ISO, and other styles
42

Li, Chaoran, and Yun Liu. "SRDA: Smart Reputation-Based Data Aggregation Protocol for Wireless Sensor Network." International Journal of Distributed Sensor Networks 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/105364.

Full text
Abstract:
Wireless sensor network is a self-organizing multihop network, which is composed of a large number of wireless sensor nodes and usually deployed in unattended environment to collect target information. At present, WSN is facing a growing range of security threats owing to its wireless and resource-constrained characteristics. Compromised sensor nodes can easily corrupt data accuracy and integrity by falsifying sensed information, selectively forwarding or misdirecting received data packets during the process of data aggregation. To solve these security problems, we propose a smart reputation-b
APA, Harvard, Vancouver, ISO, and other styles
43

Zhang, Jiang, and Qi Liu. "New key management scheme lattice-based for clustered wireless sensor networks." PLOS ONE 18, no. 8 (2023): e0290323. http://dx.doi.org/10.1371/journal.pone.0290323.

Full text
Abstract:
Aiming at the quantum algorithm which can solve the problem of large integer decomposition and discrete logarithm in polynomial time, an anti-quantum computing key management scheme for clustered sensor networks is proposed in this paper. The lattice-based cryptosystem is used to achieve the anti-quantum performance of the key management scheme, and the security of the network is further improved through the mutual authentication of sensor network nodes. Due to the limited storage space of sensor nodes, this paper adopts the cluster management of wireless sensor networks, and most sensor nodes
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Shanshan, and Yun Chen. "Optimization of Wireless Sensor Network Architecture with Security System." Journal of Sensors 2021 (November 8, 2021): 1–11. http://dx.doi.org/10.1155/2021/7886639.

Full text
Abstract:
Wireless sensor network (WSN) is a new type of wireless network. It has many advantages, but there are some problems. These problems make it easier for attackers to analyze network security holes and attack and destroy entire networks. This article designs a security wireless sensor network model. It can resist most known network attacks without significantly reducing the energy power of sensor nodes. First, we cluster the network organization to reduce energy consumption. It also protects the network based on the calculation of trust levels and the establishment of trust relationships between
APA, Harvard, Vancouver, ISO, and other styles
45

Thangamuthu, A. P. "A Survey on Various Attacks and Countermeasures in Wireless Sensor Networks." Shanlax International Journal of Arts, Science and Humanities 9, no. 2 (2021): 26–34. http://dx.doi.org/10.34293/sijash.v9i2.4159.

Full text
Abstract:
The Wireless Sensor Network (WSN) is an evolving technological base comprising spatially dispersed, autonomous tiny sensing devices called nodes. Today, wireless sensor networks are not exclusively limited to military uses such as frontline surveillance. However, they are still used in various industrial and civilian applications, including industrial process tracking and operation, robotic health monitoring, vibration and flame monitoring, healthcare systems, home automation, and traffic management. Nodes, such as temperature, hermetic, vibration, pressure, leisure seizure, or pollutant param
APA, Harvard, Vancouver, ISO, and other styles
46

Kaur, Simerpreet, Md Ataullah, and Monika Garg. "Security from Denial of Sleep Attack in Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2005): 419–25. http://dx.doi.org/10.24297/ijct.v4i2b1.3230.

Full text
Abstract:
With the advancement in Wireless Sensor Network (WSN) sensors are gaining importance in the physical world. Besides the low power of sensor nodes used, sensors are widely used in detecting temperature, pollution, pressure and other various applications. Energy-constrained sensor networks periodically place nodes to sleep in order to extend the network Lifetime. Denial of sleep attacks are a great threat to lifetime of sensor networks as it prevents the nodes from going into sleep mode. In this paper we are describing prevention against Denials of sleep attack. We have analyzed each of proposed
APA, Harvard, Vancouver, ISO, and other styles
47

Lu, Yao, Shuo Cheng, Xiaofei Zhu, and Geon Seok Yang. "Construction of Landscape Ecological Planning Evaluation Model Based on Sensor Network." Journal of Sensors 2022 (September 27, 2022): 1–10. http://dx.doi.org/10.1155/2022/2989351.

Full text
Abstract:
The application of wireless sensor network (WSN) technology promotes the modernization of forestry. WSN application technology in forest areas is an important research topic for the sustainable development of forestry in China and is also a research hotspot for forestry ecological monitoring at present. The application of wireless sensor networks in forest areas, first of all, solves the problem of limited energy supply and low-latency data transmission in the forest environment. Due to the large area of the forest environment and uneven tree density, dynamic changes in forest height, easy to
APA, Harvard, Vancouver, ISO, and other styles
48

Zheng, Yan Hua. "A Research on Key Management in Wireless Sensor Networks." Applied Mechanics and Materials 303-306 (February 2013): 247–50. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.247.

Full text
Abstract:
With the constant development of wireless sensor networks technology, the expanding application scope and the increasing processing power of sensor nodes, there are more and more data collected and processed through the sensor, thus ensuring the security of information transmission between nodes is in urgent needs. The secure application of wireless sensor networks has become a hot technology. This paper mainly expounds the key management schemes of wireless sensor networks, and analyzes the mainstream key management schemes.
APA, Harvard, Vancouver, ISO, and other styles
49

Seidu, Rafiw, Abdul-Mumin Selanwiah Salifu, and Johnbosco A. K. Ansuura. "A Genetic Algorithm with a Trust Model Function for Detecting Sinkhole and Wormhole Nodes in Wireless Sensor Networks." Transactions on Engineering and Computing Sciences 12, no. 4 (2024): 30–44. https://doi.org/10.14738/tecs.124.17242.

Full text
Abstract:
This study delved into wireless sensor networks, comprising numerous nodes with limited energy, computation, and transmission capabilities. Wireless sensor networks face security challenges due to their vulnerability to capture and compromise in insecure environments. Malicious nodes exploit communication's wireless nature, engaging in sinkhole and wormhole attacks. To address this, we propose a genetic strategy utilising a trust-based formula as a fitness function to evaluate sensor node reliability. Nodes progressing beyond a trust threshold criterion are identified, isolating malicious node
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Ke. "A wormhole attack detection method for tactical wireless sensor networks." PeerJ Computer Science 9 (August 29, 2023): e1449. http://dx.doi.org/10.7717/peerj-cs.1449.

Full text
Abstract:
Wireless sensor networks (WSNs) are networks formed by organizing and combining tens of thousands of sensor nodes freely through wireless communication technology. WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. As one of the more severe threats, wormholes create passive attacks that are hard to detect and eliminate. Since WSN is often used in the tactical network field, a planned secure network is essential for military applications with high security. Guard nodes are traffic monitoring nodes used to supervise neighbors’ d
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!