2017 International Conference on Advanced Systems and Electric Technologies (IC_ASET) 2017
DOI: 10.1109/aset.2017.7983668
|View full text |Cite
|
Sign up to set email alerts
|

A survey on wireless sensor networks security issues and military specificities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 47 publications
(22 citation statements)
references
References 18 publications
0
20
0
1
Order By: Relevance
“…Security requirements depend on specific environment and WSNs can be applied in myriad environments. If WSNs are combined with IoT technology, then both the security requirements of the IoT [89] and the security requirements of WSNs must be considered for security. It means that security factors also need to be reconsidered according to the specific environment to which WSNs can be applied.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
“…Security requirements depend on specific environment and WSNs can be applied in myriad environments. If WSNs are combined with IoT technology, then both the security requirements of the IoT [89] and the security requirements of WSNs must be considered for security. It means that security factors also need to be reconsidered according to the specific environment to which WSNs can be applied.…”
Section: Evaluation and Discussionmentioning
confidence: 99%
“…The hierarchal model with different types of sensors has been utilized in various environments. For example, in a military environment, different types of sensors are utilized to collect data (e.g., images, sounds, and motions) for different purposes such as intrusion detection, chemical and biological threat detection, and object presence detection [7,8]. The sensors can also be classified based on their physical properties such as motion sensors, thermal sensors, pressure sensors, and chemical sensors [9].…”
Section: Network Modelmentioning
confidence: 99%
“…Once it happened then continues to select an unoccupied slot and moves to the active phase; otherwise, it continues listening is given in Figure 6. wait [2] wait [3] wait [ Poonam K.K, Asif Ali Laghari and Rashid Ali Laghari Figure 6. Discover phase Active Phase.…”
Section: Probabilistic-model Checkermentioning
confidence: 99%
“…Like different technologies, enhancements in wireless sensor networks were truly encouraged by military applications and manufacturing companies (such as for instance, tracking enemies, robot control, vehicle tracking and so on) [1,2,3,4]. Nowadays, wireless sensor networks are utilized as a part of an others fields like human services checking, water quality observing, air contamination observing, thus many other fields [5,6,7].…”
Section: Introductionmentioning
confidence: 99%