Journal articles on the topic 'A security framework for wireless sensor networks'

To see the other types of publications on this topic, follow the link: A security framework for wireless sensor networks.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'A security framework for wireless sensor networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Guyeux, Christophe, Abdallah Makhoul, Ibrahim Atoui, Samar Tawbi, and Jacques M. Bahi. "A Complete Security Framework for Wireless Sensor Networks." International Journal of Information Technology and Web Engineering 10, no. 1 (January 2015): 47–74. http://dx.doi.org/10.4018/ijitwe.2015010103.

Full text
Abstract:
Wireless sensor networks are often deployed in public or otherwise untrusted and even hostile environments, which prompt a number of security issues. Although security is a necessity in other types of networks, it is much more so in sensor networks due to the resource-constraint, susceptibility to physical capture, and wireless nature. Till now, most of the security approaches proposed for sensor networks present single solution for particular and single problem. Therefore, to address the special security needs of sensor networks as a whole we introduce a security framework. In their framework, the authors emphasize the following areas: (1) secure communication infrastructure, (2) secure scheduling, and (3) a secure data aggregation algorithm. Due to resource constraints, specific strategies are often necessary to preserve the network's lifetime and its quality of service. For instance, to reduce communication costs, data can be aggregated through the network, or nodes can go to sleep mode periodically (nodes scheduling). These strategies must be proven as secure, but protocols used to guarantee this security must be compatible with the resource preservation requirement. To achieve this goal, secure communications in such networks will be defined, together with the notions of secure scheduling and secure aggregation. The concepts of indistinguability, nonmalleability, and message detection resistance will thus be adapted to communications in wireless sensor networks. Finally, some of these security properties will be evaluated in concrete case studies.
APA, Harvard, Vancouver, ISO, and other styles
2

Prasad, Neeli R., and Mahbubul Alam. "Security Framework for Wireless Sensor Networks." Wireless Personal Communications 37, no. 3-4 (May 16, 2006): 455–69. http://dx.doi.org/10.1007/s11277-006-9044-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

El Zouka, Hesham A. "An Adaptable Security Framework for Wireless Sensor Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 9 (September 30, 2014): 4898–906. http://dx.doi.org/10.24297/ijct.v13i9.2390.

Full text
Abstract:
The design of secure and survivable nodes is one of the most vital issues in designing energy-efficient protocols for wireless sensor network where the energy, memory and computational power of sensor nodes are limited. In this paper, some of the challenges facing the wireless sensor networks are discussed in attempting to prolong the battery lifetime of the nodes, and to secure the communication channel. While most of these attacks can be dealt with through cryptographic security protocols provided by key management schemes, there are always a few that manage to really cause problems. One such attack that is most common and significant in WSNs is cloning attack. In clone attack, the intruder tries to capture and compromise some nodes and inject them into several locations throughout the network in order to conduct other types of attacks. Moreover, if this attack is not detected early, then these replicated injected nodes will consume a large amount of the network resources. Several possible approaches are suggested to improve the security, authentication protocols, and key management schemes in WSNs. Furthermore, utilizing the existing security protocols in wireless sensor networks has led us to propose a secure framework which incorporates security protocols in a way that minimizes the energy consumption of the sensor nodes. Our algorithm ensures data confidentiality, node authentication, and data integrity while remaining within acceptable memory, time and energy constrains.
APA, Harvard, Vancouver, ISO, and other styles
4

TIAN, Bin, Yi-xian YANG, Dong LI, Qi LI, and Yang XIN. "A security framework for wireless sensor networks." Journal of China Universities of Posts and Telecommunications 17 (December 2010): 118–22. http://dx.doi.org/10.1016/s1005-8885(09)60571-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Divya, K., and B. Srinivasan. "Review on Security in Wireless Sensor Networks." Asian Journal of Computer Science and Technology 8, S1 (February 5, 2019): 63–66. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1956.

Full text
Abstract:
Wireless Sensor Networks (WSN) is a rising innovation and step by step it is pulling in the consideration of scientists with its testing qualities and differentiated application space. The more scientists attempt to grow encourage cost and vitality proficient figuring gadgets and calculations for WSN, the all the more difficult it gets to be to fit the security of WSN into that obliged environment. Be that as it may, security is vital to the accomplishment of applying WSN. Along these lines, commonality with the security parts of WSN is basic before planning WSN framework. In this paper, we review the condition of craftsmanship in securing remote sensor systems. We audit a few conventions that give security in sensor systems. Additionally, this study records the notable assaults at the Network layer of WSN.
APA, Harvard, Vancouver, ISO, and other styles
6

Wei, Min, Kee Wook Rim, and Kee Cheon Kim. "An Intrusion Detection Scheme for Home Wireless Sensor Networks." Applied Mechanics and Materials 121-126 (October 2011): 3799–804. http://dx.doi.org/10.4028/www.scientific.net/amm.121-126.3799.

Full text
Abstract:
In this paper, we propose an intrusion detection framework through multi-agents scheme for wireless home automation networks. Our mechanisms include the wireless sensor network intrusion detection architecture and an intrusion detection scheme for security enhancement. For the performance evaluation of our mechanism, we use the wireless data measured on the real wireless home networks. The simulation results show that the security manager detect the intrusion attack to improve the whole performance of the system, and can prolong the lifetime of the network.
APA, Harvard, Vancouver, ISO, and other styles
7

V, Malathi. "A Security Framework for Wireless Sensor Networks: IBE-Trust." IOSR Journal of Electronics and Communication Engineering 2, no. 4 (2012): 05–09. http://dx.doi.org/10.9790/2834-0240509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bashar, Abul, and Smys S. "Physical Layer Protection Against Sensor Eavesdropper Channels in Wireless Sensor Networks." June 2021 3, no. 2 (June 3, 2021): 59–67. http://dx.doi.org/10.36548/jsws.2021.2.001.

Full text
Abstract:
This paper presents an analysis of Wireless Sensor Network (WSN) security issues that take place due to eavesdropping. The sensor-eavesdropper channels and the sensor sinks are exposed to generalized K-fading. Based on the physical layer security framework we use cumulative distribution, optimal sensors and round robin scheduling scheme to decrease the probability of interception and to equip secure connection between the nodes. For identifying the interception probability, a novel analytical methodology is present with simple analytical expressions. Moreover, diversity orders of scheduling schemes and asymptotic closed-form expressions are evaluated. Numerical results show the crucial result of shadowing and fading parameters of wiretap and main links, selected schemes on WSN security and network size. We have analyzed the output using Monte Carlo simulation and conclusions show the validation of the proposed work.
APA, Harvard, Vancouver, ISO, and other styles
9

Itani, Wassim, Ayman Kayssi, and Ali Chehab. "Wireless Body Sensor Networks." International Journal of Reliable and Quality E-Healthcare 5, no. 2 (April 2016): 1–30. http://dx.doi.org/10.4018/ijrqeh.2016040101.

Full text
Abstract:
In this paper, the authors provide a detailed overview and technical discussion and analysis of the latest research trends in securing body sensor networks. The core of this work aims at: (1) identifying the resource limitations and energy challenges of this category of wireless sensor networks, (2) considering the life-critical applications and emergency contexts that are encompassed by body sensor network services, and (3) studying the effect of these peculiarities on the design and implementation of rigorous and efficient security algorithms and protocols. The survey discusses the main advancements in the design of body sensor network cryptographic services (key generation and management, authentication, confidentiality, integrity, and privacy) and sheds the light on the prominent developments achieved in the field of securing body sensor network data in Cloud computing architectures. The elastic virtualization mechanisms employed in the Cloud, as well as the lucrative computing and storage resources available, makes the integration of body sensor network applications, and Cloud platforms a natural choice that is packed with various security and privacy challenges. The work presented in this paper focuses on Cloud privacy and integrity mechanisms that rely on tamper-proof hardware and energy-efficient cryptographic data structures that are proving to be well-suited for operation in untrusted Cloud environments. This paper also examines two crucial design patterns that lie at the crux of any successful body sensor network deployment which are represented in: (1) attaining the right balance between the degree, complexity, span, and strength of the cryptographic operations employed and the energy resources they consume. (2) Achieving a feasible tradeoff between the privacy of the human subject wearing the body sensor network and the safety of this subject. This is done by a careful analysis of the medical status of the subject and other context-related information to control the degree of disclosure of sensitive medical data. The paper concludes by presenting a practical overview of the cryptographic support in the main body sensor network development frameworks such and TinyOS and SPINE and introduces a set of generalized guideline patterns and recommendations for designing and implementing cryptographic protocols in body sensor network environments.
APA, Harvard, Vancouver, ISO, and other styles
10

Sharma, Gaurav, Suman Bala, and Anil K. Verma. "Security Frameworks for Wireless Sensor Networks-Review." Procedia Technology 6 (2012): 978–87. http://dx.doi.org/10.1016/j.protcy.2012.10.119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mittal, Poonam. "A Novel Framework to Secure CBWSNS Against the Selfishness Problem." Science & Technology Journal 7, no. 2 (July 1, 2019): 7–16. http://dx.doi.org/10.22232/stj.2019.07.02.01.

Full text
Abstract:
Dynamic and cooperative nature of sensor nodes in Wireless Sensor Networks raises question on security. Various researchers work in this direction to spot malicious, selfish and compromised nodes. Various mechanisms followed are uniqueness of clustering, reputation system and an operation at specific nodes. LEACH is a hierarchical protocol in which most nodes transmit to cluster heads, and the cluster heads aggregate and compress the data and forward it to the base station (sink). Each node uses a stochastic algorithm at each round to determine whether it will become a cluster head in this round. Clustering process carried out in two stages takes the role of the reputation scheme and reveals specific operation at CH, IN and MNs beside their usual activities in cluster based wireless sensor networks. This paper mentioned the final structure of the security framework, corresponding attacks and defense mechanism of the model. It also discusses various security level processes of wireless sensor networks. Results implies that in a cluster-based protocol such as LEACH in which optimally 5% of the nodes are cluster heads it is likely that a significant portion of the network can be paralyzed or the entire network disabled, in the worst-case scenario, if these cluster heads are compromised. Our main contribution in this paper is our novel approach in maintaining trusted clusters through a trust-based decision-making cluster head election algorithm.
APA, Harvard, Vancouver, ISO, and other styles
12

Tripathy, Somanath. "ESF: an efficient security framework for wireless sensor network." International Journal of Communication Networks and Distributed Systems 10, no. 2 (2013): 176. http://dx.doi.org/10.1504/ijcnds.2013.051822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Miranda, Christian, Georges Kaddoum, Elias Bou-Harb, Sahil Garg, and Kuljeet Kaur. "A Collaborative Security Framework for Software-Defined Wireless Sensor Networks." IEEE Transactions on Information Forensics and Security 15 (2020): 2602–15. http://dx.doi.org/10.1109/tifs.2020.2973875.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Jokhio, Sana H., Imran Ali Jokhio, and Andrew H. Kemp. "Light-weight framework for security-sensitive wireless sensor networks applications." IET Wireless Sensor Systems 3, no. 4 (December 1, 2013): 298–306. http://dx.doi.org/10.1049/iet-wss.2012.0127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Alves, Renan C. A., Doriedson A. G. Oliveira, Geovandro C. C. F. Pereira, Bruno C. Albertini, and Cíntia B. Margi. "WS3N: Wireless Secure SDN-Based Communication for Sensor Networks." Security and Communication Networks 2018 (August 1, 2018): 1–14. http://dx.doi.org/10.1155/2018/8734389.

Full text
Abstract:
The Software Defined Networking (SDN) paradigm can provide flexible routing and potentially support the different communication patterns that exist in Wireless Sensor Networks (WSN). However applying this paradigm to resource-constrained networks is not straightforward, especially if security services are a requirement. Existing SDN-based approaches for WSN evolved over time, addressing resource-constrained requirements. However, they do not integrate security services into their design and implementation. This work’s main contribution is a secure-by-design SDN-based framework for Wireless Sensors Networks. Secure node admission and end-to-end key distribution to support secure communication are considered key services, which the framework must provide. We describe its specification, design, implementation, and experiments considering device and protocol constraints. The results indicate that our approach has achieved such goals with acceptable overheads up to medium sized networks.
APA, Harvard, Vancouver, ISO, and other styles
16

Ishaq, Zeba, Seongjin Park, and Younghwan Yoo. "A Security Framework for Cluster-Based Wireless Sensor Networks against the Selfishness Problem." Wireless Communications and Mobile Computing 2018 (July 10, 2018): 1–11. http://dx.doi.org/10.1155/2018/8961239.

Full text
Abstract:
Over the last few decades, Cluster-Based Wireless Sensor Networks (CBWSNs) have played a crucial role in handling various challenges (load balancing, routing, network lifetime, etc.) of large scale Wireless Sensor Networks (WSNs). However, the security becomes a big problem for CBWSNs, especially when nodes in the cluster selfishly behave, e.g., not forwarding other nodes’ data, to save their limited resources. This may make the cluster obsolete, even destroying the network. Thus, a way to guarantee the secure and consistent clusters is needed for proper working of CBWSNs. We showed that the selfishness attack, i.e., passive attack or insider attack, in CBWSNs can cause severe performance disaster, when particularly a cluster head node becomes selfish. In order to prevent this situation, this paper proposes a security framework that involves a novel clustering technique as well as a reputation system at nodes for controlling selfishness, making them cooperative and honest. The novelty of the clustering comes from the existence of inspector node (IN) to monitor the cluster head (CH) and its special working style. The experimental results showed that the proposed security framework can control the selfishness and improve the security of the clusters.
APA, Harvard, Vancouver, ISO, and other styles
17

Yassine, Sabri, and Najib El Kamoun. "Attacks and Secure Geographic Routing In Wireless Sensor Networks." Indonesian Journal of Electrical Engineering and Computer Science 5, no. 1 (January 1, 2017): 147. http://dx.doi.org/10.11591/ijeecs.v5.i1.pp147-158.

Full text
Abstract:
Due to open network nature of wireless sensor networks make them highly vulnerable to a variety of security attacks and easy target for adversaries, which may capture these nodes, analyze and easily insert fake route information. Wireless sensor network is an emerging, cost effective and unsupervised solution for collecting this information from the physical world and sending this information back to centralized authority for further processing. GRPW (Geographic Routing in connected wireless sensor networks based on Multiple Sinks) is one of the basic routing protocols used for Supporting Mobile Sinks in Wireless Sensor Networks. GRPW, a geographical routing protocol for wireless sensor networks, is based on an architecture partitioned by logical levels, on the other hand based on a multipoint relaying flooding technique to reduce the number of topology broadcast. GRPW-MuS uses periodic HELLO packets to neighbor detection. The wormhole attack can form a serious threat in wireless sensor networks, especially against many wireless sensor networks routing protocols and location-based wireless security systems. Here, a trust model to handle this attack in GRPW is provided called GRPW-MuS-s. Using OMNET++ simulation and the MiXiM framework, results show that GRPW-MuS-s protocol only has very small false positives for wormhole detection during the neighbor discovery process (less than GRPW). The average energy usage at each node for GRPW-MuS-s protocol during the neighbor discovery and route discovery is very low than GRPW-MuS, which is much lower than the available energy at each node. The cost analysis shows that GRPW-MuS-s protocol only needs small memory usage at each node, which is suitable for the sensor network.
APA, Harvard, Vancouver, ISO, and other styles
18

Zhao, Jing Ying, Hai Guo, and Wei Wei. "An Efficient Two-Factor User Authentication Framework for Wireless Sensor Networks." Applied Mechanics and Materials 147 (December 2011): 320–23. http://dx.doi.org/10.4028/www.scientific.net/amm.147.320.

Full text
Abstract:
Nowadays, Wireless sensor networks (WSNs) are appeared to be new and promising solutions for next generation real-time wireless monitoring applications. These WSNs could become a threat if suitable security is not considered before the deployment. However, if there is any loophole in security, that might opens the door to attackers and hence, endanger for the applications. So, user authentication is one of the core requirements to protect WSNs data access from the unauthorized users. In this regard, we propose an efficient two-factor user authentication for WSNs, which is based on password and smart card (two-factors). Our scheme provides mutual authentication, enables the user to choose and change their password frequently. Moreover, they provides strong protection against different kind of attacks at reasonable computation cost.
APA, Harvard, Vancouver, ISO, and other styles
19

Claycomb, William R., and Dongwan Shin. "A novel node level security policy framework for wireless sensor networks." Journal of Network and Computer Applications 34, no. 1 (January 2011): 418–28. http://dx.doi.org/10.1016/j.jnca.2010.03.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Ometov, Aleksandr, Sergey Bezzateev, Natalia Voloshina, Pavel Masek, and Mikhail Komarov. "Environmental Monitoring with Distributed Mesh Networks: An Overview and Practical Implementation Perspective for Urban Scenario." Sensors 19, no. 24 (December 16, 2019): 5548. http://dx.doi.org/10.3390/s19245548.

Full text
Abstract:
Almost inevitable climate change and increasing pollution levels around the world are the most significant drivers for the environmental monitoring evolution. Recent activities in the field of wireless sensor networks have made tremendous progress concerning conventional centralized sensor networks known for decades. However, most systems developed today still face challenges while estimating the trade-off between their flexibility and security. In this work, we provide an overview of the environmental monitoring strategies and applications. We conclude that wireless sensor networks of tomorrow would mostly have a distributed nature. Furthermore, we present the results of the developed secure distributed monitoring framework from both hardware and software perspectives. The developed mechanisms provide an ability for sensors to communicate in both infrastructure and mesh modes. The system allows each sensor node to act as a relay, which increases the system failure resistance and improves the scalability. Moreover, we employ an authentication mechanism to ensure the transparent migration of the nodes between different network segments while maintaining a high level of system security. Finally, we report on the real-life deployment results.
APA, Harvard, Vancouver, ISO, and other styles
21

Díaz, Álvaro, Javier González-Bayon, and Pablo Sánchez. "Security Estimation in Wireless Sensor Network Simulator." Journal of Circuits, Systems and Computers 25, no. 07 (April 22, 2016): 1650067. http://dx.doi.org/10.1142/s0218126616500675.

Full text
Abstract:
Sensor nodes are low-power and low-cost devices with the requirement of a long autonomous lifetime. Therefore, the nodes have to use the available power carefully and avoid expensive computations or radio transmissions. In addition, as some wireless sensor networks (WSNs) process sensitive data, selecting a security protocol is vital. Cryptographic methods used in WSNs should fulfill the constraints of sensor nodes and should be evaluated for their security and power consumption. WSN engineers use several metrics to obtain estimations prior to network deployment. These metrics are usually related to power and execution time estimation. However, security is a feature that cannot be estimated and it is either “active” or “inactive”, with no possibility of introducing intermediate security levels. This lack of flexibility is a disadvantage in real deployments where different operation modes with different security and power specifications are often needed. This paper proposes including a new security estimation metric in a previously proposed framework for WSN simulation and embedded software (SW) performance analysis. This metric is called Security Estimation Metric (SEM) and it provides information about the security encryption used in WSN transmissions. Results show that the metric improves flexibility, granularity and execution time compared to other cryptographic tests.
APA, Harvard, Vancouver, ISO, and other styles
22

Gomez, Laurent, and Michel Riveill. "Trusted Integration of Wireless Sensor Networks into Herd Control Monitoring Application." International Journal of Agricultural and Environmental Information Systems 4, no. 4 (October 2013): 1–24. http://dx.doi.org/10.4018/ijaeis.2013100101.

Full text
Abstract:
Integration of trusted information is an important requirement from business application. As business applications adaption relies on sensor data, that information must be trustworthy enough in order to prevent any misuse of sensor data. For example, the use of un-trustworthy information in healthcare system can have severe consequence on patient life. But it appears that sensors are not tamper resistant enough in order to prevent any capture of cryptographic material stored on the nodes. Therefore, a soft security alternative of hardening security mechanisms is to ensure trustworthiness of sensor data. From its production on the node to its delivery to the business application, and including its processing and forwarding, the authors propose to assess sensor data along its life-cycle. In this paper, the authors propose a framework for the assessment of sensor data trustworthiness, from the acquisition at the node to their delivery to business applications, including any intermediary routing or processing. The assessment aims at identifying erroneous sensor data caused intentionally or unintentionally. In addition, the authors evaluate their approach with real sensor data acquired in the scope of the WASP project (http://www.wasp-project.org - Wirelessly Accessible Sensor Populations - IST 034963) during a herd control experiment.
APA, Harvard, Vancouver, ISO, and other styles
23

Derakhshan, Farnaz, and Shamim Yousefi. "A review on the applications of multiagent systems in wireless sensor networks." International Journal of Distributed Sensor Networks 15, no. 5 (May 2019): 155014771985076. http://dx.doi.org/10.1177/1550147719850767.

Full text
Abstract:
Nowadays, the efficiency of multiagent systems in wireless sensor networks prompts the researchers to use these emerging mobile software packets in different simulated approaches or real-world applications. Heterogeneous and distributed wireless sensor networks could be integrated with the multiagent systems to map the real-world challenges into the artificial intelligence world. The multiagent systems have been applied from simulated approaches like object detection/tracking, healthcare, control/assistant, and security systems to real-world applications, including medical/human-care systems and unmanned aerial vehicles. Furthermore, the integration of wireless sensor networks with multiagent systems have emerged novel application, which is known as mobile robots. However, the extensive use of mobile agents in wireless sensor networks has posed different challenges for researchers, including security, resource, and timing limitation. In this work, we review recent simulated approaches and real-world applications of multiagent systems in wireless sensor networks, in which a set of common factors about the things that have been studied are extracted and compared to analyze the performance of mobile agent–based systems in the wireless sensor networks, as well. This analysis provides new research directions about multiagent systems in wireless sensor networks for interested researchers. Finally, a novel framework for dealing with the challenges of multiagent-based applications in the wireless sensor networks which have been mentioned is suggested.
APA, Harvard, Vancouver, ISO, and other styles
24

Jariwala, Vivaksha, Himanshu Patel, Parth Patel, and Devesh C. Jinwala. "Integrity and Privacy Preserving Secure Data Aggregation in Wireless Sensor Networks." International Journal of Distributed Systems and Technologies 5, no. 3 (July 2014): 77–99. http://dx.doi.org/10.4018/ijdst.2014070104.

Full text
Abstract:
Data aggregation based on in-network processing is useful in improving the communications overhead in Wireless Sensor Networks (WSNs) by reducing the overall number of packets communicated to the base station. However, due to the fusion of data items sourced at different nodes into a single one, the security of the aggregated data as well as that of the aggregating node, demands critical investigation. This paper observes that though there have been substantial numbers of research attempts recently in proposing techniques for secure data aggregation, there is still a need for a coherent, integrated framework for secure data aggregation. It proposes such an integrated framework for secure data aggregation in this paper. The proposed framework implements a secure data aggregation protocol, offering the attributes viz. confidentiality, privacy, authentication, robustness, as well as data integrity using a defined data aggregation topology. In addition to that, the proposed framework is based on a zero configuration protocol that supports a generation of a defined aggregation topology and a key exchange procedure. This work supports the framework with detailed security analysis and performance evaluation on TinyOS platform using TOSSIM as the base simulator. Through humble observations, this is an unique attempt that integrates the support for security features, topology generation and key management in a single, secure data aggregation protocol; substantiating the proposal with elaborate experimental evaluation, too.
APA, Harvard, Vancouver, ISO, and other styles
25

El Emary, Ibrahiem Mahmoud Mohamed. "Management and Challenges Facing Wireless Sensor Networks in Telemedicine Applications." International Journal of Healthcare Delivery Reform Initiatives 2, no. 4 (October 2010): 39–65. http://dx.doi.org/10.4018/978-1-61520-805-0.ch009.

Full text
Abstract:
This chapter focuses on the management process of the wireless sensor networks in telemedicine applications. The main management tasks that are reported and addressed covers: topology management, privacy and security issues in WSN management, topology management algorithms, and route management schemes. Also, failure detection in WSN and fault management application using MANNA was presented and discussed. The major challenges and design issues facing WSN management was touched in a separate section. Typical telemedicine interactions involve both store-and-forward and live interaction. Both the traditional live and store-and-forward telemedicine systems provide an extension of healthcare services using fixed telecommunications networks (i.e. non-mobile). Various telemedicine solutions have been proposed and implemented since its initial use some 30 years ago in the fixed network environment using wired telecommunications networks (e.g. digital subscriber line). Technological advancements in wireless communications systems, namely wireless personal area networks (WPANs), wireless local area networks (WLANs), WiMAX broadband access, and cellular systems (2.5G, 3G and beyond 3G) now have the potential to significantly enhance telemedicine services by creating a flexible and heterogeneous network within an end-to-end telemedicine framework. In the future, integrating wireless solutions into healthcare delivery may well come to be a requirement, not just a differentiator, for accurate and efficient healthcare delivery. However, this raises some very significant challenges in terms of interoperability, performance and the security of such systems.
APA, Harvard, Vancouver, ISO, and other styles
26

V.RanjithKumar, P., Sandeep P. Nemagoud, Sandeep Kumar E, and Vijaya Kumar B P. "A Novel Security Framework based on Genetics for Clustered Wireless Sensor Networks." International Journal of Computer Applications 96, no. 5 (June 18, 2014): 8–13. http://dx.doi.org/10.5120/16788-6374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Md Abdul Azeem, Khaleel ur Rahman khan, and Pramod. "Security Architecture Framework and Secure Routing Protocols in Wireless Sensor Networks - Survey." International Journal of Computer Science & Engineering Survey 2, no. 4 (November 30, 2011): 189–204. http://dx.doi.org/10.5121/ijcses.2011.2414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Chan, Aldar C.-F., and Claude Castelluccia. "A security framework for privacy-preserving data aggregation in wireless sensor networks." ACM Transactions on Sensor Networks 7, no. 4 (February 2011): 1–45. http://dx.doi.org/10.1145/1921621.1921623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jan, Saeed Ullah, Sikandar Ali, Irshad Ahmed Abbasi, Mogeeb A. A. Mosleh, Ahmed Alsanad, and Hizbullah Khattak. "Secure Patient Authentication Framework in the Healthcare System Using Wireless Medical Sensor Networks." Journal of Healthcare Engineering 2021 (July 22, 2021): 1–20. http://dx.doi.org/10.1155/2021/9954089.

Full text
Abstract:
Biosensor is a means to transmit some physical phenomena, like body temperature, pulse, respiratory rate, electroencephalogram (EEG), electrocardiogram (ECG), and blood pressure. Such transmission is performed via Wireless Medical Sensor Network (WMSN) while diagnosing patients remotely through Internet-of-Medical-Things (IoMT). The sensitive data transmitted through WMSN from IoMT over an insecure channel is vulnerable to several threats and needs proper attention to be secured from adversaries. In contrast to addressing the security of all associated entities involving patient monitoring in the healthcare system or ensuring the integrity, authorization, and nonrepudiation of information over the communication line, no one can guarantee its security without a robust authentication protocol. Therefore, we have proposed a lightweight and robust authentication scheme for the network-enabled healthcare devices (IoMT) that mitigate all the identified weaknesses posed in the recent literature. The proposed protocol’s security has been analyzed formally using BAN logic and ProVerif2.02 and informally using pragmatic illustration. Simultaneously, at the end of the paper, the performance analysis result shows a delicate balance of security with performance that is often missing in the current protocols.
APA, Harvard, Vancouver, ISO, and other styles
30

Furtak, Zieliński, and Chudzikiewicz. "A Framework for Constructing a Secure Domain of Sensor Nodes." Sensors 19, no. 12 (June 21, 2019): 2797. http://dx.doi.org/10.3390/s19122797.

Full text
Abstract:
Application of the Internet of Things (IoT) in some critical areas (e.g., military) is limited mainly due to the lack of robust, secure, and trusted measures needed to ensure the availability, confidentiality, and integrity of information throughout its lifecycle. Considering the mostly limited resources of IoT devices connected by wireless networks and their dynamic placement in unsupervised or even hostile environments, security is a complex and considerable issue. In this paper, a framework which encompasses an approach to integrate some security measures to build a so-called “secure domain of sensors nodes” is proposed. The framework is based on the use of the Trusted Platform Modules (TPMs) in wireless sensor nodes. It encompasses an architecture of sensor nodes, their roles in the domain, and the data structures as well as the developed procedures which could be applied to generate the credentials for the sensor nodes, and subsequently, to build a local trust structure of each node as well as to build a trust relationship between a domain’s nodes. The proposed solution ensures the authentication of sensor nodes and their resistance against unauthorized impact with the hardware/software configuration allowing protection against malware that can infect the software. The usefulness of the presented framework was confirmed experimentally.
APA, Harvard, Vancouver, ISO, and other styles
31

Gupta, Radhika, Dr Sahil Verma, Dr Kavita, and Anup Ial Yadav. "A Comparative Analysis of Trust Based Applications in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 4.12 (October 4, 2018): 73. http://dx.doi.org/10.14419/ijet.v7i4.12.20996.

Full text
Abstract:
The wireless sensor network is a type of ad hoc network which is vulnerable to security attacks, specifically insider attacks. In spite of the fact that confidentiality, integrity and authentication helps in forestalling the particular sort of attacks, but they come at an expense. A traditional and evergreen concept of the trust evaluation and management, among the nodes of a network, for communication is a good and effective security measure. Overseeing trust in a distributed wireless sensor network is a challenging task when coordinated effort or participation is must in accomplishing mission and framework objectives. The paper represents a survey of various trust applications which are very helpful for carrying out a secure data transmission in a sensor network. The analysed trust applications malicious attack detection, secure data aggregation, secure node selection and secure routing.
APA, Harvard, Vancouver, ISO, and other styles
32

Kaur, Jugminder, Sandeep S. Gill, and Balwinder S. Dhaliwal. "Secure Trust Based Key Management Routing Framework for Wireless Sensor Networks." Journal of Engineering 2016 (2016): 1–9. http://dx.doi.org/10.1155/2016/2089714.

Full text
Abstract:
Security is always a major concern in wireless sensor networks (WSNs). Several trust based routing protocols are designed that play an important role in enhancing the performance of a wireless network. However they still have some disadvantages like limited energy resources, susceptibility to physical capture, and little protection against various attacks due to insecure wireless communication channels. This paper presents a secure trust based key management (STKF) routing framework that establishes a secure trustworthy route depending upon the present and past node to node interactions. This route is then updated by isolating the malicious or compromised nodes from the route, if any, and a dedicated link is created between every pair of nodes in the selected route with the help of “q” composite random key predistribution scheme (RKPS) to ensure data delivery from source to destination. The performance of trust aware secure routing framework (TSRF) is compared with the proposed routing scheme. The results indicate that STKF provides an effective mechanism for finding out a secure route with better trustworthiness than TSRF which avoids the data dropping, thereby increasing the data delivery ratio. Also the distance required to reach the destination in the proposed protocol is less hence effectively utilizing the resources.
APA, Harvard, Vancouver, ISO, and other styles
33

Jesus, Thiago, Paulo Portugal, Francisco Vasques, and Daniel Costa. "Automated Methodology for Dependability Evaluation of Wireless Visual Sensor Networks." Sensors 18, no. 8 (August 10, 2018): 2629. http://dx.doi.org/10.3390/s18082629.

Full text
Abstract:
Wireless sensor networks have been considered as an effective solution to a wide range of applications due to their prominent characteristics concerning information retrieving and distributed processing. When visual information can be also retrieved by sensor nodes, applications acquire a more comprehensive perception of monitored environments, fostering the creation of wireless visual sensor networks. As such networks are being more often considered for critical monitoring and control applications, usually related to catastrophic situation prevention, security enhancement and crises management, fault tolerance becomes a major expected service for visual sensor networks. A way to address this issue is to evaluate the system dependability through quantitative attributes (e.g., reliability and availability), which require a proper modeling strategy to describe the system behavior. That way, in this paper, we propose a methodology to model and evaluate the dependability of wireless visual sensor networks using Fault Tree Analysis and Markov Chains. The proposed modeling strategy considers hardware, battery, link and coverage failures, besides considering routing protocols on the network communication behavior. The methodology is automated by a framework developed and integrated with the SHARPE (Symbolic Hierarchical Automated Reliability and Performance Evaluator) tool. The achieved results show that this methodology is useful to compare different network implementations and the corresponding dependability, enabling the uncovering of potentially weak points in the network behavior.
APA, Harvard, Vancouver, ISO, and other styles
34

Pius Owoh, Nsikak, and Manmeet Mahinderjit Singh. "SenseCrypt: A Security Framework for Mobile Crowd Sensing Applications." Sensors 20, no. 11 (June 9, 2020): 3280. http://dx.doi.org/10.3390/s20113280.

Full text
Abstract:
The proliferation of mobile devices such as smartphones and tablets with embedded sensors and communication features has led to the introduction of a novel sensing paradigm called mobile crowd sensing. Despite its opportunities and advantages over traditional wireless sensor networks, mobile crowd sensing still faces security and privacy issues, among other challenges. Specifically, the security and privacy of sensitive location information of users remain lingering issues, considering the “on” and “off” state of global positioning system sensor in smartphones. To address this problem, this paper proposes “SenseCrypt”, a framework that automatically annotates and signcrypts sensitive location information of mobile crowd sensing users. The framework relies on K-means algorithm and a certificateless aggregate signcryption scheme (CLASC). It incorporates spatial coding as the data compression technique and message query telemetry transport as the messaging protocol. Results presented in this paper show that the proposed framework incurs low computational cost and communication overhead. Also, the framework is robust against privileged insider attack, replay and forgery attacks. Confidentiality, integrity and non-repudiation are security services offered by the proposed framework.
APA, Harvard, Vancouver, ISO, and other styles
35

Agah, Afrand, Kalyan Basu, and Sajal K. Das. "Security enforcement in wireless sensor networks: A framework based on non-cooperative games." Pervasive and Mobile Computing 2, no. 2 (April 2006): 137–58. http://dx.doi.org/10.1016/j.pmcj.2005.12.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Pathak, Ganesh R., and Suhas H. Patil. "Mathematical Model of Security Framework for Routing Layer Protocol in Wireless Sensor Networks." Procedia Computer Science 78 (2016): 579–86. http://dx.doi.org/10.1016/j.procs.2016.02.121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Riaz, Rabia, Ayesha Naureen, Attiya Akram, Ali Hammad Akbar, Ki-Hyung Kim, and H. Farooq Ahmed. "A unified security framework with three key management schemes for wireless sensor networks." Computer Communications 31, no. 18 (December 2008): 4269–80. http://dx.doi.org/10.1016/j.comcom.2008.05.043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Mawlood Hussein, Safwan, Juan Antonio López Ramos, and José Antonio Álvarez Bermejo. "Distributed Key Management to Secure IoT Wireless Sensor Networks in Smart-Agro." Sensors 20, no. 8 (April 15, 2020): 2242. http://dx.doi.org/10.3390/s20082242.

Full text
Abstract:
With the deepening of the research and development in the field of embedded devices, the paradigm of the Internet of things (IoT) is gaining momentum. Its technology’s widespread applications increasing the number of connected devices constantly. IoT is built on sensor networks, which are enabling a new variety of solutions for applications in several fields (health, industry, defense, agrifood and agro sectors, etc.). Wireless communications are indispensable for taking full advantage of sensor networks but implies new requirements in the security and privacy of communications. Security in wireless sensor networks (WSNs) is a major challenge for extending IoT applications, in particular those related to the smart-agro. Moreover, limitations on processing capabilities of sensor nodes, and power consumption have made the encryption techniques devised for conventional networks not feasible. In such scenario, symmetric-key ciphers are preferred for key management in WSN; key distribution is therefore an issue. In this work, we provide a concrete implementation of a novel scalable group distributed key management method and a protocol for securing communications in IoT systems used in the smart agro sector, based on elliptic curve cryptography, to ensure that information exchange between layers of the IoT framework is not affected by sensor faults or intentional attacks. In this sense, each sensor node executes an initial key agreement, which is done through every member’s public information in just two rounds and uses some authenticating information that avoids external intrusions. Further rekeying operations require just a single message and provide backward and forward security.
APA, Harvard, Vancouver, ISO, and other styles
39

Cionca, Victor, Thomas Newe, and Vasile Teodor Dădârlat. "Configuration Tool for a Wireless Sensor Network Integrated Security Framework." Journal of Network and Systems Management 20, no. 3 (November 11, 2011): 417–52. http://dx.doi.org/10.1007/s10922-011-9219-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Khan, Rahat Ali, and Al-Sakib Khan Pathan. "The state-of-the-art wireless body area sensor networks: A survey." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771876899. http://dx.doi.org/10.1177/1550147718768994.

Full text
Abstract:
Wireless body area sensor network is a sub-field of wireless sensor network. Wireless body area sensor network has come into existence after the development of wireless sensor network reached some level of maturity. This has become possible due to the tremendous technological advancement leading to easy-to-use wireless wearable technologies and electronic components that are small in size. Indeed, this field has gained significant attention in recent time due to its applications which mostly are toward healthcare sector. Today, tiny-sized sensors could be placed on the human body to record various physiological parameters and these sensors are capable of sending data to other devices so that further necessary actions could be taken. Hence, this can be used for diagnosis of disease and for developing serious health-complication alert systems. Considering this recent hot topic, the intent of this work is to present the state-of-the-art of various aspects of wireless body area sensor network, its communication architectures, wireless body area sensor network applications, programming frameworks, security issues, and energy-efficient routing protocols. We have tried to cover the latest advancements with some discussion on the available radio technologies for this type of network. Future visions and challenges in this area are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
41

Tong, Xin, Lan Chen, and Ying Li. "A Cellular Intrusion Detection Framework for Packet Dropping Attacks in Wireless Sensor Networks." Applied Mechanics and Materials 128-129 (October 2011): 441–45. http://dx.doi.org/10.4028/www.scientific.net/amm.128-129.441.

Full text
Abstract:
Wireless sensor networks (WSNs) are vulnerable to a variety of malicious attacks, especially the packet dropping attack, making security an important research field. Since prevention based techniques are less helpful for guarding against inside attacks, intrusion detection (ID) techniques are indispensable to provide advanced protection. This paper proposes an innovative cellular ID framework for packet dropping attack, which takes the deployment of passive listening nodes into consideration. Performance evaluation made in VisualSense demonstrates its high detection accuracy.
APA, Harvard, Vancouver, ISO, and other styles
42

Liao, Run-Fa, Hong Wen, Jinsong Wu, Fei Pan, Aidong Xu, Yixin Jiang, Feiyi Xie, and Minggui Cao. "Deep-Learning-Based Physical Layer Authentication for Industrial Wireless Sensor Networks." Sensors 19, no. 11 (May 28, 2019): 2440. http://dx.doi.org/10.3390/s19112440.

Full text
Abstract:
In this paper, a deep learning (DL)-based physical (PHY) layer authentication framework is proposed to enhance the security of industrial wireless sensor networks (IWSNs). Three algorithms, the deep neural network (DNN)-based sensor nodes’ authentication method, the convolutional neural network (CNN)-based sensor nodes’ authentication method, and the convolution preprocessing neural network (CPNN)-based sensor nodes’ authentication method, have been adopted to implement the PHY-layer authentication in IWSNs. Among them, the improved CPNN-based algorithm requires few computing resources and has extremely low latency, which enable a lightweight multi-node PHY-layer authentication. The adaptive moment estimation (Adam) accelerated gradient algorithm and minibatch skill are used to accelerate the training of the neural networks. Simulations are performed to evaluate the performance of each algorithm and a brief analysis of the application scenarios for each algorithm is discussed. Moreover, the experiments have been performed with universal software radio peripherals (USRPs) to evaluate the authentication performance of the proposed algorithms. Due to the trainings being performed on the edge sides, the proposed method can implement a lightweight authentication for the sensor nodes under the edge computing (EC) system in IWSNs.
APA, Harvard, Vancouver, ISO, and other styles
43

Zhao, Nan Nan, and Jian Bo Yao. "Hybrid Key Management Scheme for WSN." Applied Mechanics and Materials 513-517 (February 2014): 424–30. http://dx.doi.org/10.4028/www.scientific.net/amm.513-517.424.

Full text
Abstract:
Wireless sensor networks are widely applied in various applications. But due to the resource-constrained sensor nodes and the malicious attacks, the traditional key management schemes are not suitable for the network. Contraposing the particularities, many relevant key management schemes are developed for WSNs the network. Based on the framework of WSNs, existing schemes can be classified into two categories: flat distributed architecture and hierarchical architecture. In this paper, a hybrid key management scheme for wireless sensor network is proposed by combining the distributed architecture and the hierarchical architecture. Based on the modified version of Dus matrix construction, this scheme can apply in WSNs with the network topology changes. Compared with existing key management schemes, this scheme can provide sufficient security, nicer key connectivity and low key storage overhead.
APA, Harvard, Vancouver, ISO, and other styles
44

Prema Tulasi, V., Prof D. Durga Bhavani, and Author CH.G.V.N.Prasad. "Implementing Data Security in Wireless Sensor Networks through Location Aware Multifunctional Key Management Framework." International Journal of Computer Applications 13, no. 1 (January 12, 2011): 13–22. http://dx.doi.org/10.5120/1746-2379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Hussain, Aamir, Tariq Ali, Faisal Althobiani, Umar Draz, Muhammad Irfan, Sana Yasin, Saher Shafiq, et al. "Security Framework for IoT Based Real-Time Health Applications." Electronics 10, no. 6 (March 18, 2021): 719. http://dx.doi.org/10.3390/electronics10060719.

Full text
Abstract:
The amazing fusion of the internet of things (IoT) into traditional health monitoring systems has produced remarkable advances in the field of e-health. Different wireless body area network devices and sensors are providing real-time health monitoring services. As the number of IoT devices is rapidly booming, technological and security challenges are also rising day by day. The data generated from sensor-based devices need confidentiality, integrity, authenticity, and end-to-end security for safe communication over the public network. IoT-based health monitoring systems work in a layered manner, comprising a perception layer, a network layer, and an application layer. Each layer has some security, and privacy concerns that need to be addressed accordingly. A lot of research has been conducted to resolve these security issues in different domains of IoT. Several frameworks for the security of IoT-based e-health systems have also been developed. This paper introduces a security framework for real-time health monitoring systems to ensure data confidentiality, integrity, and authenticity by using two common IoT protocols, namely constrained application protocol (CoAP) and message query telemetry transports (MQTT). This security framework aims to defend sensor data against the security loopholes while it is continuously transmitting over the layers and uses hypertext transfer protocols (HTTPs) for this purpose. As a result, it shields from the breach with a very low ratio of risk. The methodology of this paper focuses on how the security framework of IoT-based real-time health systems is protected under the tiers of CoAP and HTTPs. CoAP works alongside HTTPs and is responsible for providing end-to-end security solutions.
APA, Harvard, Vancouver, ISO, and other styles
46

Batra, Isha, Sahil Verma, Kavita, and Mamoun Alazab. "A lightweight IoT-based security framework for inventory automation using wireless sensor network." International Journal of Communication Systems 33, no. 4 (October 29, 2019): e4228. http://dx.doi.org/10.1002/dac.4228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Salman, Ayman Dawood, Osamah Ibrahim Khalaf, and Ghaida Muttasher Abdulsaheb. "An adaptive intelligent alarm system for wireless sensor network." Indonesian Journal of Electrical Engineering and Computer Science 15, no. 1 (July 1, 2019): 142. http://dx.doi.org/10.11591/ijeecs.v15.i1.pp142-147.

Full text
Abstract:
Security is one of the imperative issues in an advanced local condition. The current center around formative and research issues of Wireless Sensor Network(WSN) based Smart Home. WSN based shrewd home detection system gives a safe and safe living condition. A Wireless Sensor System (WSN) is a system which is building by utilizing little independent hubs (sensors). Its motivation is to screen certain ecological parameters, for example, temperature, dampness, brilliance, weight, sound, movement, and so forth. This paper depicts the improvement of a smart home condition dependent on exact Wireless Sensor Network and furthermore depicts private vitality observing and controlling procedures for keen home systems administration framework. This paper proposes a basic and adaptable remote arrange for domestics computerization of temperature, moistness, gas, movement and light by executing dependable sensor hubs which can be controlled too observed. This innovation offers energizing and new chance to build the availability of devices inside the home for the home computing.
APA, Harvard, Vancouver, ISO, and other styles
48

Parenreng, Jumadi, and Akio Kitagawa. "Resource Optimization Techniques and Security Levels for Wireless Sensor Networks Based on the ARSy Framework." Sensors 18, no. 5 (May 17, 2018): 1594. http://dx.doi.org/10.3390/s18051594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Wang, Gicheol, Byoung-Sun Lee, Jae Young Ahn, and Gihwan Cho. "A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey." Security and Communication Networks 2018 (June 19, 2018): 1–17. http://dx.doi.org/10.1155/2018/6475927.

Full text
Abstract:
UAS (Unmanned Aerial Systems) are now drawing a lot of attention from academic and research fields as well as the general public. The UAS is expected to provide many promising applications such as intelligent transportation system, disaster management, search and rescue, public safety, smart delivery, wild species monitoring, and wireless service area extension. More specifically, as a part of the wireless service extension, we deal with the information dissemination and collection using a UAV in this paper. In this application, because the UAV communicates with each CH (Cluster Head) to collect data from sensor nodes or to disseminate information to the sensor nodes, well-behaved and qualified nodes should be elected as CHs and their integrity should be preserved. Even though a UAV makes the information dissemination and collection process efficient in a WSN, we can make the UAV help the election of new CHs to mitigate the threat of compromised CHs. To this aim, we first propose a UAV-aided CH election framework where a UAV delivers the critical information collected from sensors to the sink, and the sink reselects a set of well-behaved and qualified CHs considering the information. Then, we classify the existing security-driven CH election schemes into several categories and explain the principle of each category and its representative schemes. For each representative scheme, we also explain how to adapt it into the UAV-aided CH election framework. Next, we identify some desirable security properties that a CH election scheme should provide and reveal the security level that each representative scheme reaches for the desirable security properties. Next, we compare communication and computation overhead of the security-driven CH election schemes in terms of the big O notation. In conclusion, we reveal what we have learned from this survey work and provide a future work item.
APA, Harvard, Vancouver, ISO, and other styles
50

Khalifeh, Ala’, Khalid A. Darabkh, Ahmad M. Khasawneh, Issa Alqaisieh, Mohammad Salameh, Ahmed AlAbdala, Shams Alrubaye, et al. "Wireless Sensor Networks for Smart Cities: Network Design, Implementation and Performance Evaluation." Electronics 10, no. 2 (January 19, 2021): 218. http://dx.doi.org/10.3390/electronics10020218.

Full text
Abstract:
The advent of various wireless technologies has paved the way for the realization of new infrastructures and applications for smart cities. Wireless Sensor Networks (WSNs) are one of the most important among these technologies. WSNs are widely used in various applications in our daily lives. Due to their cost effectiveness and rapid deployment, WSNs can be used for securing smart cities by providing remote monitoring and sensing for many critical scenarios including hostile environments, battlefields, or areas subject to natural disasters such as earthquakes, volcano eruptions, and floods or to large-scale accidents such as nuclear plants explosions or chemical plumes. The purpose of this paper is to propose a new framework where WSNs are adopted for remote sensing and monitoring in smart city applications. We propose using Unmanned Aerial Vehicles to act as a data mule to offload the sensor nodes and transfer the monitoring data securely to the remote control center for further analysis and decision making. Furthermore, the paper provides insight about implementation challenges in the realization of the proposed framework. In addition, the paper provides an experimental evaluation of the proposed design in outdoor environments, in the presence of different types of obstacles, common to typical outdoor fields. The experimental evaluation revealed several inconsistencies between the performance metrics advertised in the hardware-specific data-sheets. In particular, we found mismatches between the advertised coverage distance and signal strength with our experimental measurements. Therefore, it is crucial that network designers and developers conduct field tests and device performance assessment before designing and implementing the WSN for application in a real field setting.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography