2020
DOI: 10.3390/s20020403
|View full text |Cite
|
Sign up to set email alerts
|

A Secure and Portable Multi-Sensor Module for Distributed Air Pollution Monitoring

Abstract: Air quality in urban environments has become a central issue of our present society as it affects the health and lives of the population all over the world. The first step in mitigating negative effects is proper measurement of the pollution level. This work presents a portable air pollution measurement system, built from off-the-shelf devices, that is designed to assure user privacy and data authenticity. Data is collected from sensor modules that can be hand carried or installed on vehicles, possibly leading… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 42 publications
0
11
0
Order By: Relevance
“…As seen, fullerenes are closed hollow cages in which C-atoms are sp 2 -hybridized carbon atoms. However, to generate the spherical cage, the structure cannot be generated using only hexagonal rings.…”
Section: Fullerenes and Carbon Onionsmentioning
confidence: 94%
See 2 more Smart Citations
“…As seen, fullerenes are closed hollow cages in which C-atoms are sp 2 -hybridized carbon atoms. However, to generate the spherical cage, the structure cannot be generated using only hexagonal rings.…”
Section: Fullerenes and Carbon Onionsmentioning
confidence: 94%
“…However, some short-range order can be observed in amorphous carbon (aC) phases. In aC both graphitic sp 2 and tetrahedral sp 3 hybrids coexist. The prevalence of one or the other of these hybrids imparts properties mirroring those of graphite or diamond.…”
Section: Properties Of Carbon Nanostructuresmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the PoW consensus mechanism consumes high computational power. In [44,45], mobile sensors cover large areas of smart cities. However, sensor nodes are resource constrained, and their deployment and maintenance cost is very high.…”
Section: 3mentioning
confidence: 99%
“…However, these mechanisms are prone to the single point of failure issue that is harmful to the network [13]. In [14], authors propose an authentication scheme using group signature method, which creates opportunities for the nodes to act maliciously. The reason is these nodes can hide behind the group ID.…”
Section: Introductionmentioning
confidence: 99%