首页 > 最新文献

传感技术(英文)最新文献

英文 中文
Application of P(VDF-TrFE) Copolymer in Acoustic Emission Sensor P(VDF-TrFE)共聚物在声发射传感器中的应用
Pub Date : 2020-03-31 DOI: 10.12677/jsta.2020.82004
廖佳妮, 谭少博, 张志成
{"title":"Application of P(VDF-TrFE) Copolymer in Acoustic Emission Sensor","authors":"廖佳妮, 谭少博, 张志成","doi":"10.12677/jsta.2020.82004","DOIUrl":"https://doi.org/10.12677/jsta.2020.82004","url":null,"abstract":"","PeriodicalId":68742,"journal":{"name":"传感技术(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43541549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Computational Intelligence Techniques in Wireless Sensor Networks the State of the Art 计算智能技术在无线传感器网络中的应用
Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0427-6.CH018
S. Pani
A wireless sensor network may contain hundreds or even tens of thousands of inexpensive sensor devices that can communicate with their neighbors within a limited radio range. By relaying information on each other, they transmit signals to a command post anywhere within the network. Worldwide market for wireless sensor networks is rapidly growing due to a huge variety of applications it offers. In this chapter, we discuss application of computational intelligence techniques in wireless sensor networks on the coverage problem in general and area coverage in particular. After providing different types of coverage encountered in WSN, we present a possible classification of coverage algorithms. Then we dwell on area coverage which is widely studied due to its importance. We provide a survey of literature on area coverage and give an account of its state-of-the art and research directions.
无线传感器网络可以包含数百甚至数万个廉价的传感器设备,这些传感器设备可以在有限的无线电范围内与其相邻设备通信。通过相互传递信息,它们将信号传送到网络内任何地方的指挥所。由于无线传感器网络提供了各种各样的应用,全球无线传感器网络市场正在迅速增长。在本章中,我们讨论了计算智能技术在无线传感器网络中对覆盖问题的一般应用,特别是区域覆盖问题。在提供了WSN中遇到的不同类型的覆盖之后,我们提出了一种可能的覆盖算法分类。然后,我们讨论了由于其重要性而被广泛研究的区域覆盖。我们对区域覆盖的文献进行了综述,并对其现状和研究方向进行了阐述。
{"title":"Application of Computational Intelligence Techniques in Wireless Sensor Networks the State of the Art","authors":"S. Pani","doi":"10.4018/978-1-5225-0427-6.CH018","DOIUrl":"https://doi.org/10.4018/978-1-5225-0427-6.CH018","url":null,"abstract":"A wireless sensor network may contain hundreds or even tens of thousands of inexpensive sensor devices that can communicate with their neighbors within a limited radio range. By relaying information on each other, they transmit signals to a command post anywhere within the network. Worldwide market for wireless sensor networks is rapidly growing due to a huge variety of applications it offers. In this chapter, we discuss application of computational intelligence techniques in wireless sensor networks on the coverage problem in general and area coverage in particular. After providing different types of coverage encountered in WSN, we present a possible classification of coverage algorithms. Then we dwell on area coverage which is widely studied due to its importance. We provide a survey of literature on area coverage and give an account of its state-of-the art and research directions.","PeriodicalId":68742,"journal":{"name":"传感技术(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74225490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Sensor Information Fusion Technology Based on Projection Pursuit Simulated Annealing 基于投影追踪模拟退火的多传感器信息融合技术
Pub Date : 2020-01-01 DOI: 10.12677/jsta.2020.82002
友好 张
{"title":"Multi-Sensor Information Fusion Technology Based on Projection Pursuit Simulated Annealing","authors":"友好 张","doi":"10.12677/jsta.2020.82002","DOIUrl":"https://doi.org/10.12677/jsta.2020.82002","url":null,"abstract":"","PeriodicalId":68742,"journal":{"name":"传感技术(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66128218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy Harvesting Models and Techniques 能量收集模型和技术
Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2454-1.ch002
Saira Muzafar
Wireless sensor networks (WSNs) has gain popularity due to their wide range of applications in almost all walks of life including industry controls, environmental monitoring, health, transportation, military, civil infrastructure, science, security and more. Wireless sensor nodes are cheap and tiny in size therefore its deployment is easier. They perform well in harsh environments where human intervention is almost difficult or not possible. However, wireless sensor networks are resource constraints and its power supply has been a big challenge to keep the sensor nodes functional for a longer period. Advancement in low power electronics helped a lot but the use and maintenance of conventional batteries with a limited life span cannot address the power supply problem effectively in a long run. Therefore, harvesting energy from ambient environment is an effective alternative both in terms of power and cost, which can help sensor networks to live longer. This chapter mainly focuses on different possible energy sources available in ambient environment and current technological mechanism to harvest energy for WSNs.
无线传感器网络(wsn)由于其广泛的应用于几乎所有行业,包括工业控制,环境监测,健康,交通,军事,民用基础设施,科学,安全等,而越来越受欢迎。无线传感器节点价格便宜,体积小,因此部署更容易。它们在恶劣的环境中表现良好,在这种环境中,人类几乎很难或不可能干预。然而,无线传感器网络受资源限制,其供电对传感器节点的长时间运行提出了很大的挑战。低功耗电子技术的进步帮助很大,但使用和维护寿命有限的传统电池不能有效地解决长期供电问题。因此,从周围环境中收集能量在功率和成本方面都是一种有效的替代方案,可以帮助传感器网络寿命更长。本章主要介绍了环境中各种可能的能量来源,以及目前无线传感器网络获取能量的技术机制。
{"title":"Energy Harvesting Models and Techniques","authors":"Saira Muzafar","doi":"10.4018/978-1-7998-2454-1.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-2454-1.ch002","url":null,"abstract":"Wireless sensor networks (WSNs) has gain popularity due to their wide range of applications in almost all walks of life including industry controls, environmental monitoring, health, transportation, military, civil infrastructure, science, security and more. Wireless sensor nodes are cheap and tiny in size therefore its deployment is easier. They perform well in harsh environments where human intervention is almost difficult or not possible. However, wireless sensor networks are resource constraints and its power supply has been a big challenge to keep the sensor nodes functional for a longer period. Advancement in low power electronics helped a lot but the use and maintenance of conventional batteries with a limited life span cannot address the power supply problem effectively in a long run. Therefore, harvesting energy from ambient environment is an effective alternative both in terms of power and cost, which can help sensor networks to live longer. This chapter mainly focuses on different possible energy sources available in ambient environment and current technological mechanism to harvest energy for WSNs.","PeriodicalId":68742,"journal":{"name":"传感技术(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75087816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wireless Head Gesture Controlled Robotic Wheel Chair for Physically Disable Persons 用于身体残疾人士的无线头部手势控制机器人轮椅
Pub Date : 2020-01-01 DOI: 10.4236/jst.2020.104004
Shadman Mahmood Khan Pathan, Wasif Ahmed, M. Rana, Md. Shahjalal Tasin, Faisul Islam, Anika Sultana
A robotic wheelchair is assumed to be capable of doing tasks like navigation, obstacle detection, etc. using sensors and intelligence. The initial part of the work was development of a cap controlled wheelchair to test and verify the gesture operation. Following that, a real time operating wheelchair was developed consisting of mode changing option between joystick control mode and head gesture control mode as per as the user’s requirement. The wheelchair consists of MPU6050 sensor, joystick module, RF module, battery, dc motor, toggle switch and Arduino. The movement of the head is detected by MPU6050 and the signal is transmitted to the microcontroller. Then the signal is processed by controller and motion of wheelchair is enabled for navigation. The wheelchair was capable of moving left, right, forward and backward direction. The speed of the wheelchair was 4.8 km/h when tested. Design objective of the wheelchair included cost effectiveness without compromising safety, flexibility and mobility for the users.
机器人轮椅被认为能够使用传感器和智能完成导航、障碍物探测等任务。这项工作的最初部分是开发一个帽控轮椅来测试和验证手势操作。在此基础上,根据用户需求,开发了一种具有摇杆控制模式和头姿控制模式切换选项的实时操作轮椅。轮椅由MPU6050传感器、操纵杆模块、射频模块、电池、直流电机、拨动开关和Arduino组成。MPU6050检测到机头的运动,并将信号传输给单片机。然后由控制器对信号进行处理,使轮椅运动实现导航。轮椅可以向左、向右、向前和向后移动。测试时,轮椅的速度为每小时4.8公里。轮椅的设计目标包括成本效益,同时不影响使用者的安全性、灵活性和移动性。
{"title":"Wireless Head Gesture Controlled Robotic Wheel Chair for Physically Disable Persons","authors":"Shadman Mahmood Khan Pathan, Wasif Ahmed, M. Rana, Md. Shahjalal Tasin, Faisul Islam, Anika Sultana","doi":"10.4236/jst.2020.104004","DOIUrl":"https://doi.org/10.4236/jst.2020.104004","url":null,"abstract":"A robotic wheelchair is assumed to be capable of doing tasks like navigation, obstacle detection, etc. using sensors and intelligence. The initial part of the work was development of a cap controlled wheelchair to test and verify the gesture operation. Following that, a real time operating wheelchair was developed consisting of mode changing option between joystick control mode and head gesture control mode as per as the user’s requirement. The wheelchair consists of MPU6050 sensor, joystick module, RF module, battery, dc motor, toggle switch and Arduino. The movement of the head is detected by MPU6050 and the signal is transmitted to the microcontroller. Then the signal is processed by controller and motion of wheelchair is enabled for navigation. The wheelchair was capable of moving left, right, forward and backward direction. The speed of the wheelchair was 4.8 km/h when tested. Design objective of the wheelchair included cost effectiveness without compromising safety, flexibility and mobility for the users.","PeriodicalId":68742,"journal":{"name":"传感技术(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70457591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
LEAP Enhanced 飞跃增强
Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2454-1.ch036
Maleh Yassine, Abdellah Ezzati
Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The most crucial and fundamental challenge facing WSN is security. Due to minimum capacity in-term of memory cost, processing and physical accessibility to sensors devices the security attacks are problematic. They are mostly deployed in open area, which expose them to different kinds of attacks. In this paper, the authors present an illustration of different attacks and vulnerabilities in WSN. Then the authors proposed a new lightweight cryptography algorithm for identifying compromised node in WSN called Leap Enhanced. Their evaluations on TOSSIM give a precise and detailed idea of the extra cost of consumption of resources needed to ensure the high level of expected security compared to other cryptography schemes in literature.
无线传感器网络(WSN)是由独立的、分布式的传感器组成,用于监测物理或环境条件,如温度、声音、压力等。无线传感器网络面临的最关键和最根本的挑战是安全。由于存储器成本、处理和传感器设备的物理可访问性方面的最小容量,安全攻击是有问题的。它们大多部署在开放区域,这使它们暴露在不同类型的攻击中。本文介绍了无线传感器网络中存在的各种攻击和漏洞。在此基础上,提出了一种新的轻量级密码算法——Leap Enhanced,用于识别WSN中的受损节点。他们对TOSSIM的评估给出了与文献中其他加密方案相比,确保高水平预期安全性所需的额外资源消耗成本的精确和详细的概念。
{"title":"LEAP Enhanced","authors":"Maleh Yassine, Abdellah Ezzati","doi":"10.4018/978-1-7998-2454-1.ch036","DOIUrl":"https://doi.org/10.4018/978-1-7998-2454-1.ch036","url":null,"abstract":"Wireless Sensor Network (WSN) is consisting of independent and distributed sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. The most crucial and fundamental challenge facing WSN is security. Due to minimum capacity in-term of memory cost, processing and physical accessibility to sensors devices the security attacks are problematic. They are mostly deployed in open area, which expose them to different kinds of attacks. In this paper, the authors present an illustration of different attacks and vulnerabilities in WSN. Then the authors proposed a new lightweight cryptography algorithm for identifying compromised node in WSN called Leap Enhanced. Their evaluations on TOSSIM give a precise and detailed idea of the extra cost of consumption of resources needed to ensure the high level of expected security compared to other cryptography schemes in literature.","PeriodicalId":68742,"journal":{"name":"传感技术(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85133573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eigenvector Centrality-Based Mobile Target Tracking in Wireless Sensor Networks 基于特征向量中心性的无线传感器网络移动目标跟踪
Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0501-3.CH016
N. Meghanathan
We propose an eigenvector centrality-based tracking algorithm to trace the trajectory of a mobile Radioactive Dispersal Device (RDD) in a wireless sensor network. The sink constructs an adjacency matrix in which the entry for edge (i, j) is the sum of the signal strengths reported by sensor nodes i and j in their respective neighborhoods over a sampling time period. The sink uses this adjacency matrix as the basis to determine the Eigenvector Centralities (EVC) of the vertices with respect to the radioactive signals sensed in the neighborhood. We hypothesize that sensor nodes that have a high EVC (suspect nodes) for the sampling time period are within the vicinity of the RDD within that period. We propose that the arithmetic mean (calculated by the sink) of the X and Y coordinates of the suspect sensor nodes be considered as the predicted location of the RDD at a time instant corresponding to the middle of the sampling time period. We evaluate the difference between the predicted and exact locations of the RDD trajectory over time as a function of different operating parameters.
我们提出了一种基于特征向量中心性的跟踪算法来跟踪无线传感器网络中移动放射性分散装置(RDD)的轨迹。sink构建一个邻接矩阵,其中边(i, j)的入口是传感器节点i和j在其各自的邻居中在采样时间段内报告的信号强度之和。该集使用该邻接矩阵作为基础来确定相对于在邻域中检测到的放射性信号的顶点的特征向量中心性(EVC)。我们假设在采样时间段内具有高EVC(可疑节点)的传感器节点在该时间段内位于RDD附近。我们建议将可疑传感器节点的X和Y坐标的算术平均值(由sink计算)视为RDD在采样时间段中间对应的时间瞬间的预测位置。随着时间的推移,我们评估RDD轨迹的预测位置和精确位置之间的差异,作为不同操作参数的函数。
{"title":"Eigenvector Centrality-Based Mobile Target Tracking in Wireless Sensor Networks","authors":"N. Meghanathan","doi":"10.4018/978-1-5225-0501-3.CH016","DOIUrl":"https://doi.org/10.4018/978-1-5225-0501-3.CH016","url":null,"abstract":"We propose an eigenvector centrality-based tracking algorithm to trace the trajectory of a mobile Radioactive Dispersal Device (RDD) in a wireless sensor network. The sink constructs an adjacency matrix in which the entry for edge (i, j) is the sum of the signal strengths reported by sensor nodes i and j in their respective neighborhoods over a sampling time period. The sink uses this adjacency matrix as the basis to determine the Eigenvector Centralities (EVC) of the vertices with respect to the radioactive signals sensed in the neighborhood. We hypothesize that sensor nodes that have a high EVC (suspect nodes) for the sampling time period are within the vicinity of the RDD within that period. We propose that the arithmetic mean (calculated by the sink) of the X and Y coordinates of the suspect sensor nodes be considered as the predicted location of the RDD at a time instant corresponding to the middle of the sampling time period. We evaluate the difference between the predicted and exact locations of the RDD trajectory over time as a function of different operating parameters.","PeriodicalId":68742,"journal":{"name":"传感技术(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88166000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
KDSR
Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-2454-1.ch015
Abderrahmen Guermazi, A. Belghith, M. Abid
This article deals with a key distribution protocol to secure routing in large-scale Wireless Sensor Networks (WSNs) and proposes a new protocol called KDSR. The authors' protocol has two originalities: to provide a secure network structure for large-scale WSNs, and to use lightweight local process to share efficiently the Local Broadcast Keys, the Pairwise Keys and the Global Broadcast Key. These keys are useful to secure several communication patterns in WSNs: one-to-many, one-to-one and one-to-all. Security analyses show that KDSR can withstand several attacks against WSNs. Through fast node revocation process, KDSR offers a good resilience against node capture. Immunity against MiM and replay attacks are well checked with the AVISPA tools. The experimentations are done on real TelosB motes and through the TOSSIM simulator. Simulation results confirm that KDSR is scalable, provides a good key connectivity and a good resilience. Comparison to earlier work shows that KDSR causes less computation complexity, less communication overhead and much less storage space even for large-scale WSNs.
本文研究了大规模无线传感器网络(WSNs)中用于保护路由安全的密钥分发协议,并提出了一种新的密钥分发协议KDSR。该协议具有两个创新之处:一是为大规模无线传感器网络提供安全的网络结构;二是利用轻量级的本地进程高效地共享本地广播密钥、双密钥和全局广播密钥。这些密钥用于保护wsn中的几种通信模式:一对多、一对一和一对所有。安全分析表明,KDSR能够抵御多种针对wsn的攻击。通过快速的节点撤销过程,KDSR提供了良好的抗节点捕获弹性。对MiM和重放攻击的免疫力与AVISPA工具进行了很好的检查。实验是在真实的TelosB上进行的,并通过TOSSIM模拟器进行了实验。仿真结果证实了KDSR具有可扩展性,提供了良好的密钥连通性和良好的弹性。与早期的研究相比,KDSR的计算复杂度更低,通信开销更小,存储空间更少,即使对于大规模的wsn也是如此。
{"title":"KDSR","authors":"Abderrahmen Guermazi, A. Belghith, M. Abid","doi":"10.4018/978-1-7998-2454-1.ch015","DOIUrl":"https://doi.org/10.4018/978-1-7998-2454-1.ch015","url":null,"abstract":"This article deals with a key distribution protocol to secure routing in large-scale Wireless Sensor Networks (WSNs) and proposes a new protocol called KDSR. The authors' protocol has two originalities: to provide a secure network structure for large-scale WSNs, and to use lightweight local process to share efficiently the Local Broadcast Keys, the Pairwise Keys and the Global Broadcast Key. These keys are useful to secure several communication patterns in WSNs: one-to-many, one-to-one and one-to-all. Security analyses show that KDSR can withstand several attacks against WSNs. Through fast node revocation process, KDSR offers a good resilience against node capture. Immunity against MiM and replay attacks are well checked with the AVISPA tools. The experimentations are done on real TelosB motes and through the TOSSIM simulator. Simulation results confirm that KDSR is scalable, provides a good key connectivity and a good resilience. Comparison to earlier work shows that KDSR causes less computation complexity, less communication overhead and much less storage space even for large-scale WSNs.","PeriodicalId":68742,"journal":{"name":"传感技术(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75202289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Structure Monitoring of Glass Fiber Aluminum Alloy Laminates Based on Buckypaper Paper Sensor 基于巴克纸传感器的玻璃纤维铝合金层压板结构监测
Pub Date : 2020-01-01 DOI: 10.12677/jsta.2020.84015
林 伦洋
{"title":"Structure Monitoring of Glass Fiber Aluminum Alloy Laminates Based on Buckypaper Paper Sensor","authors":"林 伦洋","doi":"10.12677/jsta.2020.84015","DOIUrl":"https://doi.org/10.12677/jsta.2020.84015","url":null,"abstract":"","PeriodicalId":68742,"journal":{"name":"传感技术(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66128946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks in Wireless Sensor Networks 无线传感器网络中的攻击
Pub Date : 2020-01-01 DOI: 10.4018/978-1-4666-8761-5.CH005
G. Kibirige, C. Sanga
Wireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their characteristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.
无线传感器网络由大量低成本、资源受限的传感器节点组成。无线传感器网络的特点是:低内存、低计算能力、部署在敌对区域且无人值守、通信能力范围小、能量能力低,使其容易受到攻击。WSN中可能发生的攻击示例有天坑攻击、选择性转发攻击和虫洞攻击。这些攻击的影响之一是,一个攻击可以用来发动其他攻击。本章介绍了对现有解决方案的探索分析,这些解决方案用于检测和识别WSN中的被动和主动攻击。分析是基于所提出的解决方案的优点和局限性。
{"title":"Attacks in Wireless Sensor Networks","authors":"G. Kibirige, C. Sanga","doi":"10.4018/978-1-4666-8761-5.CH005","DOIUrl":"https://doi.org/10.4018/978-1-4666-8761-5.CH005","url":null,"abstract":"Wireless Sensor Networks (WSN) consists of large number of low-cost, resource-constrained sensor nodes. The constraints of the WSN which make it to be vulnerable to attacks are based on their characteristics which include: low memory, low computation power, they are deployed in hostile area and left unattended, small range of communication capability and low energy capabilities. Examples of attacks which can occur in a WSN are sinkhole attack, selective forwarding attack and wormhole attack. One of the impacts of these attacks is that, one attack can be used to launch other attacks. This book chapter presents an exploration of the analysis of the existing solutions which are used to detect and identify passive and active attack in WSN. The analysis is based on advantages and limitations of the proposed solutions.","PeriodicalId":68742,"journal":{"name":"传感技术(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74665125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
传感技术(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1