Academic literature on the topic 'Wireless sensor network security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Wireless sensor network security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Wireless sensor network security"

1

Chen, Bowen. "Wireless Communication Chip Designs: analysis of the Wireless Integrated Network Sensors." Highlights in Science, Engineering and Technology 70 (November 15, 2023): 580–87. http://dx.doi.org/10.54097/hset.v70i.13989.

Full text
Abstract:
With the development of wireless technology, wireless integrated network sensor is a new form of sensor network. It enables highly efficient data acquisition and transmission by connecting the sensor nodes wirelessly. The purpose of this study is to investigate the basic principles and techniques of wireless integrated network sensors, analyze their application fields, and conduct experimental studies to verify their performance. This study first introduces the basic principles of wireless integrated network sensors, including wireless communication, sensor nodes, and network topology. Then, r
APA, Harvard, Vancouver, ISO, and other styles
2

Miptahudin, Apip, Titiek Suryani, and Wirawan Wirawan. "Wireless Sensor Network Based Monitoring System: Implementation, Constraints, and Solution." JOIV : International Journal on Informatics Visualization 6, no. 4 (2022): 778. http://dx.doi.org/10.30630/joiv.6.4.1530.

Full text
Abstract:
Wireless Sensor Network (WSN) is a collection of sensors communicating at close range by forming a wireless-based network (wireless). Since 2015 research related to the use of WSN in various health, agriculture, security industry, and other fields has continued to grow. One interesting research case is the use of WSN for the monitoring process by collecting data using sensors placed and distributed in locations based on a wireless system. Sensors with low power, multifunction, supported by a combination of wireless network, microcontroller, memory, operating system, radio communication, and en
APA, Harvard, Vancouver, ISO, and other styles
3

Liu, An, Mihui Kim, Leonardo B. Oliveira, and Hailun Tan. "Wireless Sensor Network Security." International Journal of Distributed Sensor Networks 9, no. 1 (2013): 362385. http://dx.doi.org/10.1155/2013/362385.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ahmad, Rami, Raniyah Wazirali, and Tarik Abu-Ain. "Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues." Sensors 22, no. 13 (2022): 4730. http://dx.doi.org/10.3390/s22134730.

Full text
Abstract:
Energy and security are major challenges in a wireless sensor network, and they work oppositely. As security complexity increases, battery drain will increase. Due to the limited power in wireless sensor networks, options to rely on the security of ordinary protocols embodied in encryption and key management are futile due to the nature of communication between sensors and the ever-changing network topology. Therefore, machine learning algorithms are one of the proposed solutions for providing security services in this type of network by including monitoring and decision intelligence. Machine
APA, Harvard, Vancouver, ISO, and other styles
5

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.03.

Full text
Abstract:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these netw
APA, Harvard, Vancouver, ISO, and other styles
6

P.N, Shahana. "WIRELESS SENSOR NETWORK: KEY SECURITY ISSUE AND CHALLENGES." International Journal of Innovative Research in Advanced Engineering 9, no. 5 (2022): 116–23. http://dx.doi.org/10.26562/ijirae.2022.v0905.003.

Full text
Abstract:
Wireless sensor networks (WSNs) are interconnected sensor nodes that communicate wirelessly to collect data about the surrounding environment. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these netw
APA, Harvard, Vancouver, ISO, and other styles
7

Karuppannan, Anand, and Mekala Rathinam. "A Survey on Computational Techniques in WSN Networks." Irish Interdisciplinary Journal of Science & Research 08, no. 02 (2024): 71–77. http://dx.doi.org/10.46759/iijsr.2024.8208.

Full text
Abstract:
A network made up of many tiny, inexpensive sensors that use wireless communications is now technically and economically possible because to considerable advancements in hardware manufacturing technology and the creation of effective software algorithms, this is known as a wireless sensor network. The use of sensor networks in mission-critical environments like conflict zones as well as in more commonplace security and business applications like building and traffic surveillance, habitat monitoring, and smart homes, among others, has considerable promise. Wireless sensor networks, however, pro
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Wei Guo, and Xiao Lei Li. "Problems and Solutions on Security of Wireless Sensor Network in Facilities on Sports Venues." Applied Mechanics and Materials 339 (July 2013): 195–98. http://dx.doi.org/10.4028/www.scientific.net/amm.339.195.

Full text
Abstract:
Security issue of sensor networks is greatly different from that of conventional networks. In this paper, the characteristics analysis of wireless sensor network (WSN) has been carried out firstly, through analysis, the security architecture of sensor networks is proposed, trying to outline a general illustration on this area, and then security defense on the wireless sensor network security issues has been implemented secondly, finally the pairwise keying algorithm has been described and analyzed ,from above all, the ultimate security solution of wireless sensor network has been proposed.
APA, Harvard, Vancouver, ISO, and other styles
9

Parli, B. Hari, and Narayan Singh Shailendra. "A Wireless Sensor Networks Security Protocol Architecture." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 2 (2019): 400–406. https://doi.org/10.35940/ijeat.B3252.129219.

Full text
Abstract:
A wireless sensor network is made up of extremely small autonomous units capable of sensing, computing and communicating. There are numerous restrictions on wireless sensor networks as the resource available to the wireless sensor network is limited. Thus, a number of clustering protocols in a routing sensor organization of sensor networks have been proposed in the literature which increase the throughput, save energy and decrease the delay in the system. In this paper, we put forward SNP, the one of its type link layer security architecture for wireless sensor networks. In this, the design vu
APA, Harvard, Vancouver, ISO, and other styles
10

Hari, Parli Baijnath, and Shailendra Narayan Singh. "Security Attacks at MAC and Network Layer in Wireless Sensor Networks." Journal of Advanced Research in Dynamical and Control Systems 11, no. 12 (2019): 82–89. http://dx.doi.org/10.5373/jardcs/v11i12/20193215.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Wireless sensor network security"

1

Bekara, Chakib. "Wireless sensor network security." Evry, Institut national des télécommunications, 2008. http://www.theses.fr/2008TELE0020.

Full text
Abstract:
Durant ces dernières années, l’utilisation des réseaux de capteurs sans fils (RCSF), est devenu très répandue. Les capteurs sont habituellement déployés dans une région, pour suivre un phénomène d’intérêt (température, pression, mouvement, présence, radiation, etc,), puis rapporter son évolution à une station de base, qui prendra alors des décisions dépendant des données collectées. Vu que les capteurs sont très limités en termes de ressource (CPU, stockage, énergie), qu’ils sont une proie facile aux compromissions, qu’ils fonctionnent sans assistance humaine, et peuvent être déployés dans des
APA, Harvard, Vancouver, ISO, and other styles
2

Elgaber, Adel. "Security / energy compromise in wireless sensor network." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2054.

Full text
Abstract:
L’utilisation des réseaux de capteurs offre de nouvelles perspectives dans de nombreux domaines (médecine, militaire, etc.). Les données récoltées par ces capteurs circulent en clair sur les réseaux de capteurs et peuvent être interceptées par un espion. Selon le domaine d’utilisation, le niveau de sécurité souhaité peut être élevé, ce qui peut provoquer une hausse de la consommation d’énergie sur les nœuds. Ces deux contraintes, sécurité et énergie, sont difficilement conciliables. Il y a donc un compromis à trouver entre l’économie d’énergie qui va conditionner la durée de vie du réseau, et
APA, Harvard, Vancouver, ISO, and other styles
3

Tian, Biming. "Key management for wireless sensor network security." Thesis, Curtin University, 2011. http://hdl.handle.net/20.500.11937/1157.

Full text
Abstract:
Wireless Sensor Networks (WSNs) have attracted great attention not only in industry but also in academia due to their enormous application potential and unique security challenges. A typical sensor network can be seen as a combination of a number of low-cost sensor nodes which have very limited computation and communication capability, memory space, and energy supply. The nodes are self-organized into a network to sense or monitor surrounding information in an unattended environment, while the self-organization property makes the networks vulnerable to various attacks.Many cryptographic mechan
APA, Harvard, Vancouver, ISO, and other styles
4

Abuaitah, Giovani Rimon. "Trusted Querying over Wireless Sensor Networks and Network Security Visualization." Wright State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=wright1240163119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tran-Thi-Thuy, Trang. "Secure data aggregation for wireless sensor network." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10912.

Full text
Abstract:
Like conventional networks, security is also a big concern in wireless sensor networks. However, security in this type of networks faces not only typical but also new challenges. Constrained devices, changing topology or susceptibility to unprecedented security threats such as node capture and node compromise has refrained developers from applying conventional security solutions into wireless sensor networks. Hence, developing security solutions for wireless sensor networks not only requires well security analysis but also offers a low power and processing consuming.In this thesis, we implem
APA, Harvard, Vancouver, ISO, and other styles
6

Vepanjeri, Lokanadha Reddy Sasi Kiran. "Data Security in Unattended Wireless Sensor Networks." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23646.

Full text
Abstract:
In traditional Wireless Sensor network's (WSN's), the sink is the only unconditionally trusted authority. If the sink is not connected to the nodes for a period of time then the network is considered as unattended. In Unattended Wireless Sensor Network (UWSN), a trusted mobile sink visits each node periodically to collect data. This network differs from the traditional multi hop wireless sensor networks where the nodes close to the sink deplete their power earlier than the other nodes. An UWSN can prolong the life time of the network by saving the battery of the nodes and also it can be deploy
APA, Harvard, Vancouver, ISO, and other styles
7

Iwendi, Celestine O. "Security techniques and implementation for wireless sensor network nodes." Thesis, University of Aberdeen, 2012. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=195992.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Radmand, Pedram. "An architecture framework for enhanced wireless sensor network security." Thesis, Curtin University, 2012. http://hdl.handle.net/20.500.11937/2095.

Full text
Abstract:
This thesis develops an architectural framework to enhance the security of Wireless Sensor Networks (WSNs) and provides the implementation proof through different security countermeasures, which can be used to establish secure WSNs, in a distributed and self-healing manner. Wireless Sensors are used to monitor and control environmental properties such as sound, acceleration, vibration, air pollutants, and temperature. Due to their limited resources in computation capability, memory and energy, their security schemes are susceptible to many kinds of security vulnerabilities. This thesis investi
APA, Harvard, Vancouver, ISO, and other styles
9

Shankar, Sonu. "Parameter assignment for improved connectivity and security in randomly deployed wireless sensor networks via hybrid omni/uni-directional antennas." Thesis, [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2892.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ren, Kui. "Communication security in wireless sensor networks." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-040607-174308/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Wireless sensor network security"

1

Javier, López, and Zhou Jianying, eds. Wireless sensor network security. IOS Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oreku, George S., and Tamara Pazynyuk. Security in Wireless Sensor Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-21269-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Çayirci, Erdal, and Chunming Rong. Security in Wireless Ad Hoc and Sensor Networks. John Wiley & Sons, Ltd, 2009. http://dx.doi.org/10.1002/9780470516782.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cayirci, E. Security in wireless ad hoc and sensor networks. Wiley, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhen, Jiang, and Pan Yi, eds. From problem to solution: Wireless sensor networks security. Nova Science, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

A, Szygenda Stephen, ed. Security for wireless sensor networks using identity-based cryptography. CRC Press/Taylor & Francis Group, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

McNair, Janise (Janise Yvette), 1968- and Corbett, Cherita (Cherita L.), eds. Security in ad hoc and sensor networks. World Scientific, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lopez, Pedro Peris, Julio C. Hernandez-Castro, and Tieyan Li. Security and trends in wireless identification and sensing platform tags: Advancements in RFID. Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mišić, Jelena. Wireless personal area networks: Performance, interconnections and security with IEEE 802.15.4. Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Mišić, Jelena. Wireless personal area networks: Performance, interconnections and security with IEEE 802.15.4. Wiley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Wireless sensor network security"

1

Sharma, Saurabh, Amit Sahu, Ashok Verma, and Neeraj Shukla. "Wireless Sensor Network Security." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27317-9_33.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sharma, Bobby. "Wireless Sensor Network Security." In Encyclopedia of Wireless Networks. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78262-1_253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sharma, Bobby. "Wireless Sensor Network Security." In Encyclopedia of Wireless Networks. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-32903-1_253-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rodríguez, Ciro, and Isabel Moscol. "Wireless Sensor Network Security." In Advanced Wireless Communication and Sensor Networks. Chapman and Hall/CRC, 2023. http://dx.doi.org/10.1201/9781003326205-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Weiping, Shigeng Zhang, Guihua Duan, and Hong Song. "Security in Wireless Sensor Networks." In Wireless Network Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36511-9_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Ping, Limin Sun, Xiangyan Fu, and Lin Ning. "Security in Wireless Sensor Networks." In Wireless Network Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36511-9_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Selmic, Rastko R., Vir V. Phoha, and Abdul Serwadda. "Security in WSNs." In Wireless Sensor Networks. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46769-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Du, Xiaojiang, and Yang Xiao. "A Survey on Sensor Network Security." In Wireless Sensor Networks and Applications. Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-49592-7_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Won, Jongho, and Elisa Bertino. "Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks." In Network and System Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-25645-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sandhu, Jasminder Kaur, and Sharad Saxena. "Procuring Wireless Sensor Actuator Network Security." In Proceedings of the International Conference on Recent Cognizance in Wireless Communication & Image Processing. Springer India, 2016. http://dx.doi.org/10.1007/978-81-322-2638-3_102.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Wireless sensor network security"

1

Perotti, Jose M., Angel R. Lucena, Pamela A. Mullenix, and Carlos T. Mata. "Wireless sensor network." In Defense and Security Symposium, edited by Valentin Korman. SPIE, 2006. http://dx.doi.org/10.1117/12.669702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Yu, Jaewook, Woohyung Chun, Goldie Nejat, Eric Noel, and K. Wendy Tang. "Self-Powered Wireless Sensor Balls for Homeland Security." In ASME 2007 International Mechanical Engineering Congress and Exposition. ASMEDC, 2007. http://dx.doi.org/10.1115/imece2007-42334.

Full text
Abstract:
In this paper, the development of affordable self-powered wireless sensor balls is proposed for environmental monitoring. Depending on the area of interest, multiple balls can be either thrown or rolled from a distance into the surrounding area of interest or placed beside the object of interest, and send sensory information back to a central base station, i.e., a laptop, for sensor fusion and processing. In order to achieve fast and robust deployment, reliable data delivery, and smart power management, the paper focuses on the potential wireless network and energy harvesting scheme of the bal
APA, Harvard, Vancouver, ISO, and other styles
3

Blilat, Asmae, Anas Bouayad, Nour El Houda Chaoui, and Mohammed El Ghazi. "Wireless sensor network: Security challenges." In 2012 National Days of Network Security and Systems (JNS2). IEEE, 2012. http://dx.doi.org/10.1109/jns2.2012.6249244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Karapistoli, Eirini, and Anastasios A. Economides. "Wireless sensor network security visualization." In 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT 2012). IEEE, 2012. http://dx.doi.org/10.1109/icumt.2012.6459781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kulkarni, G., P. Khatawkar, K. Gaikwad, V. Solanke, R. Shelk, and S. Gujar. "Wireless sensor network security threats." In Fifth International Conference on Advances in Recent Technologies in Communication and Computing (ARTCom 2013). Institution of Engineering and Technology, 2013. http://dx.doi.org/10.1049/cp.2013.2225.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Abd El Dayem, Sanaa S., M. R. M. Rizk, and M. A. Mokhtar. "Security for wireless sensor network." In 2016 6th International Conference on Information Communication and Management (ICICM). IEEE, 2016. http://dx.doi.org/10.1109/infocoman.2016.7784237.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yapar, Busranur, Ebu Yusuf Guven, and Muhammed Ali Aydin. "Security on Wireless Sensor Network." In 2019 4th International Conference on Computer Science and Engineering (UBMK). IEEE, 2019. http://dx.doi.org/10.1109/ubmk.2019.8907164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sovetov, B. Ya, T. M. Tatarnikova, and V. V. Cehanovsky. "Wireless Sensor Network Security Models." In 2020 9th Mediterranean Conference on Embedded Computing (MECO). IEEE, 2020. http://dx.doi.org/10.1109/meco49872.2020.9134314.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Doumerc, Robin, Benjamin Pannetier, Julien Moras, Jean Dezert, and Loic Canevet. "Track classification within wireless sensor network." In SPIE Defense + Security, edited by Tien Pham and Michael A. Kolodny. SPIE, 2017. http://dx.doi.org/10.1117/12.2267990.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Larsson, Andreas, and Philippas Tsigas. "Security in Wireless Sensor Networks." In 2011 Seventh European Conference on Computer Network Defense (EC2ND). IEEE, 2011. http://dx.doi.org/10.1109/ec2nd.2011.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Wireless sensor network security"

1

Skalka, Christian. A Language-Based Approach To Wireless Sensor Network Security. Defense Technical Information Center, 2014. http://dx.doi.org/10.21236/ada597308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alphenaar, Bruce. Wireless Sensor Network for Electric Transmission Line Monitoring. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/1004093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Renner, Adam. Wireless Vital Sign Sensor Network Simulations for Mass Casualty Response. Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada592089.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mahdavi, Rod, and William Tschudi. Wireless Sensor Network for Improving the Energy Efficiency of Data Centers. Office of Scientific and Technical Information (OSTI), 2012. http://dx.doi.org/10.2172/1171531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liang, Qilian, and Haining Shu. Wireless Sensor Network Lifetime Analysis Using Interval Type-2 Fuzzy Logic Systems. Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada428428.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yi Jia. Battery-free Wireless Sensor Network For Advanced Fossil-Fuel Based Power Generation. Office of Scientific and Technical Information (OSTI), 2011. http://dx.doi.org/10.2172/1046952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Carlos H. Rentel. Low-Cost, Robust, Threat-aware Wireless Sensor Network for Assuring the Nation's Energy Infrastructure. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/920622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Carols H. Rentel. Low-Cost, Robust, Threat-Aware Wireless Sensor Network for Assuring the Nation's Energy Infrastructure. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/920623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Carlos H. Rentel and Peter J. Marshall. Low-Cost, Robust, Threat-Aware Wireless Sensor Network for Assuring the Nation's Energy Infrastructure. Office of Scientific and Technical Information (OSTI), 2007. http://dx.doi.org/10.2172/924028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nidal, Jodeh M. Optimal UAS Assignments and Trajectories for Persistent Surveillance and Data Collection from a Wireless Sensor Network. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1003575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!