The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Access to information is crucial during conflicts and other critical events such as population uprisings. An increasing number of social interactions happen in the cyberspace, while information exchanges at the infrastructural level (monitoring systems, sensor networks, etc.) are now also based on Internet and wireless links rather than ad hoc, isolated wired networks. However, the nature of the Internet...
Wireless Sensor Network (WSN) is one of the most demanding research topics prevalent in the modern research domain. WSN consists of densely deployed sensor nodes in the area which is to be sensed or monitored. Each sensor node is a tiny and power constrained device which is assigned the task of monitoring. Sensor networks have a very wide range of application and so they are much in demand. Every...
In order to make up for deficiencies in the current mine-security monitoring system, the paper proposes a mine-security real-time monitoring system based on 6LoWPAN. In the system, WSN achieves the direct access to the internet and does not need a specific gateway to fulfil the protocol conversion or the protocol bearing, and in the meanwhile WSN achieves the end-to-end communication with the Internet...
To improve irrigation water use efficiency, reduce cost of irrigation water, this paper discussed the design of wireless sensor network and Internet technology of farmland automatic irrigation control method. Emphasis on an analysis of the routing protocol of sensor network nodes to achieve the system hardware and software design,middleware, and applications such as mobile phone or wireless PDA of...
Unattended Wireless Sensor Networks (UWSNs) are networks that operate without on-line data collection entities (Sink Collectors). This configuration enriches their flexibility but, at the same time, introduces new security issues. A challenging issue is data survival: in absence of the sink, in fact, data sensed by network sensors cannot be kept clear from the adversary. Cryptographic schemes, moreover,...
Sensor nodes are likely to be deployed in hostile locations which are accessible to an attacker. Thus these nodes are prone to be captured and compromised by adversities. An attacker can use these compromised nodes to launch various attacks, a serious one of which is false data injection. These compromised nodes inject large of bogus packets to flood the network, which can lead to exhaust the network...
A wireless sensor network (WSN) is composed of a large number of nodes deployed in a wide area. In the sensor network, there are some special nodes referred as sinks which play the role of data collector. Sinks are connected to internet so that they can forward data to the data collecting server. Thus each sensor can forward the information they sensed to any one of these sinks. In this paper, we...
In this paper, we present a disaster-scale mapping and energy-efficient alerting scheme that can be used in disaster monitoring environments that are prone to node failure and destruction due to the occurrence of disasters, and are generally deprived of GPS capabilities and or availability. The mapping scheme is able to provide a distributed mean of monitoring and reporting disaster's location which...
Expected growth in use and implementation of wireless sensor networks (WSNs) in different environments and for different applications creates new security challenges. In WSNs, a malicious node may initiate incorrect path information, change the contents of data packets, and even hijack one or more genuine network nodes. As the network reliability completely depends on individual nodespsila presence...
Huge interest and demand on information superhighway have pressed various telecommunications research fronts and lead to a new form of future Internet consisting of wired and wireless segments where resource-constrained devices such as palm pilots and sensors may become integral parts of the Internet rather than access-only platforms. One of the key design problems is the security in such heterogeneous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.