Matches in SemOpenAlex for { <https://semopenalex.org/work/W1569450318> ?p ?o ?g. }
- W1569450318 abstract "A Wireless Sensor Network consists of small battery powered wireless devices, that are capable of monitoring environmental conditions such as humidity, temperature, noise, etc. Sensor networks do not have a fixed infrastructure but form an ad hoc topology. Wireless sensor networks are emerging as a promising platform that enable a wide range of applications in both military and civilian domains such as battlefield surveillance, medical monitoring, biological detection, home security, smart spaces, inventory tracking, etc. Such networks consist of small, low-cost, resource limited (battery, bandwidth, CPU, memory) nodes that communicate wirelessly and cooperate to forward data in a multi-hop fashion. Thus, they are especially attractive in scenarios where it is infeasible or expensive to deploy a significant networking infrastructure. In wireless sensor networks, services may fail due to various reasons, including radio interference, de-synchronization, battery exhaustion, or dislocation. Such failures are caused by software and hardware faults, environmental conditions, malicious behavior, or bad timing of a legitimate action. In general, the consequence of such an event is that a node becomes unreachable or violates certain conditions that are essential for providing a service, for example by moving to a different location, the node can no further provide sensor data about its former location. In some cases, a failure caused by a simple software bug can be propagated to become a massive failure of the sensor network. This results in application trials failing completely and is not acceptable in safety critical applications. The open nature of the wireless communication, the lack of infrastructure, the fast deployment practices, and the hostile deployment environments, make them vulnerable to a wide range of intrusions and security attacks. The motivation for attacking a sensor networks could be, for example, to gain an undeserved and exclusive access to the collected data. There has been a multitude of attacks described in the literature: probabilistic data packet dropping, topology manipulation, routing table manipulation, prioritized data and control packet forwarding, identity falsification, medium access selfishness etc. The protection system of a sensor networks usually relies on the following two mechanisms: (i) authentication and secure protocols and (ii) intrusion and attack (misbehavior) detection. As the experience from the Internet shows, the weaknesses in authentication and secure protocols are frequently exploited. These protocols alone are in general considered being 3" @default.
- W1569450318 created "2016-06-24" @default.
- W1569450318 creator A5042170890 @default.
- W1569450318 creator A5066839776 @default.
- W1569450318 creator A5090897068 @default.
- W1569450318 date "2010-12-14" @default.
- W1569450318 modified "2023-10-01" @default.
- W1569450318 title "Monitoring of Wireless Sensor Networks" @default.
- W1569450318 cites W1508951650 @default.
- W1569450318 cites W1549062843 @default.
- W1569450318 cites W1575458313 @default.
- W1569450318 cites W1597141356 @default.
- W1569450318 cites W1963834187 @default.
- W1569450318 cites W1964929377 @default.
- W1569450318 cites W1965703925 @default.
- W1569450318 cites W1967676365 @default.
- W1569450318 cites W1991523989 @default.
- W1569450318 cites W1994975637 @default.
- W1569450318 cites W2002061013 @default.
- W1569450318 cites W2011662871 @default.
- W1569450318 cites W2030338951 @default.
- W1569450318 cites W2033751220 @default.
- W1569450318 cites W2036447368 @default.
- W1569450318 cites W2040341835 @default.
- W1569450318 cites W205174999 @default.
- W1569450318 cites W2085656540 @default.
- W1569450318 cites W2090636507 @default.
- W1569450318 cites W2099067922 @default.
- W1569450318 cites W2100430744 @default.
- W1569450318 cites W2101678493 @default.
- W1569450318 cites W2101690701 @default.
- W1569450318 cites W2105062250 @default.
- W1569450318 cites W2105543555 @default.
- W1569450318 cites W2107905431 @default.
- W1569450318 cites W2108039490 @default.
- W1569450318 cites W2108299551 @default.
- W1569450318 cites W2112235623 @default.
- W1569450318 cites W2114682547 @default.
- W1569450318 cites W2115907477 @default.
- W1569450318 cites W2118382442 @default.
- W1569450318 cites W2121468430 @default.
- W1569450318 cites W2122744359 @default.
- W1569450318 cites W2125083769 @default.
- W1569450318 cites W2127699957 @default.
- W1569450318 cites W2128381560 @default.
- W1569450318 cites W2131692325 @default.
- W1569450318 cites W2134804451 @default.
- W1569450318 cites W2136992183 @default.
- W1569450318 cites W2138892601 @default.
- W1569450318 cites W2140616837 @default.
- W1569450318 cites W2140820957 @default.
- W1569450318 cites W2141180368 @default.
- W1569450318 cites W2141746349 @default.
- W1569450318 cites W2142616294 @default.
- W1569450318 cites W2148922257 @default.
- W1569450318 cites W2150210451 @default.
- W1569450318 cites W2152461919 @default.
- W1569450318 cites W2154299843 @default.
- W1569450318 cites W2160203360 @default.
- W1569450318 cites W2160505338 @default.
- W1569450318 cites W2167471791 @default.
- W1569450318 cites W2168452204 @default.
- W1569450318 cites W2169537372 @default.
- W1569450318 cites W2476448192 @default.
- W1569450318 cites W3012992223 @default.
- W1569450318 cites W3014525507 @default.
- W1569450318 cites W3084706010 @default.
- W1569450318 cites W371287981 @default.
- W1569450318 cites W1565847141 @default.
- W1569450318 cites W2515146124 @default.
- W1569450318 cites W2626640398 @default.
- W1569450318 doi "https://doi.org/10.5772/13239" @default.
- W1569450318 hasPublicationYear "2010" @default.
- W1569450318 type Work @default.
- W1569450318 sameAs 1569450318 @default.
- W1569450318 citedByCount "4" @default.
- W1569450318 countsByYear W15694503182012 @default.
- W1569450318 countsByYear W15694503182013 @default.
- W1569450318 countsByYear W15694503182014 @default.
- W1569450318 countsByYear W15694503182015 @default.
- W1569450318 crossrefType "book-chapter" @default.
- W1569450318 hasAuthorship W1569450318A5042170890 @default.
- W1569450318 hasAuthorship W1569450318A5066839776 @default.
- W1569450318 hasAuthorship W1569450318A5090897068 @default.
- W1569450318 hasBestOaLocation W15694503181 @default.
- W1569450318 hasConcept C108037233 @default.
- W1569450318 hasConcept C127413603 @default.
- W1569450318 hasConcept C24590314 @default.
- W1569450318 hasConcept C31258907 @default.
- W1569450318 hasConcept C41008148 @default.
- W1569450318 hasConcept C41971633 @default.
- W1569450318 hasConcept C555944384 @default.
- W1569450318 hasConcept C58074150 @default.
- W1569450318 hasConcept C62611344 @default.
- W1569450318 hasConcept C66938386 @default.
- W1569450318 hasConcept C7091991 @default.
- W1569450318 hasConcept C76155785 @default.
- W1569450318 hasConcept C94523657 @default.
- W1569450318 hasConceptScore W1569450318C108037233 @default.
- W1569450318 hasConceptScore W1569450318C127413603 @default.