2014
DOI: 10.1109/jsen.2014.2354980
|View full text |Cite
|
Sign up to set email alerts
|

From Sensing to Action: Quick and Reliable Access to Information in Cities Vulnerable to Heavy Rain

Abstract: Access to the full text of the published version may require a subscription. Abstract-Cities need to constantly monitor weather to anticipate heavy storm events and reduce the impact of floods. Information describing precipitation and ground conditions at high spatio-temporal resolution is essential for taking timely action and preventing damages. Traditionally, rain gauges and weather radars are used to monitor rain events, but these sources provide low spatial resolutions and are subject to inaccuracy. There… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3
2

Relationship

4
6

Authors

Journals

citations
Cited by 26 publications
(11 citation statements)
references
References 21 publications
(25 reference statements)
0
11
0
Order By: Relevance
“…Smart instrumentation and drainage maintenance (e.g. Gaitan et al, 2014;ten Veldhuis and Clemens, 2011), and emergency protocols (e.g. Melo et al, 2015), as well as retrofitting of existing infrastructure and urban redevelopment (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…Smart instrumentation and drainage maintenance (e.g. Gaitan et al, 2014;ten Veldhuis and Clemens, 2011), and emergency protocols (e.g. Melo et al, 2015), as well as retrofitting of existing infrastructure and urban redevelopment (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…If there exists an access point whose MAC address doesn't match then that access point is considered to be rogue and is dropped. There can be a case where the MAC address is spoofed in order to get the MAC address of authorized access point, then the packet is passed to the anomaly detection sensors where different tools like Ettercap [16], Wireshark [17], Snort [18] and Anomaly detection heuristic payload sifting [19] are used in order to filter the unauthorized access point and detect different attacks. These attacks that can be detected are ARP spoofing, Man-in-the-middle attack, Denial-of-service (DOS) attack, Distributed denial of service (DDOS) attack and attacks like smurf .…”
Section: Rogue Mitigationmentioning
confidence: 99%
“…As these technologies are usually deployed in wireless environments, Wireless Sensor Networks (WSN) have become a suitable solution for an increasing number of applications, including health monitoring, smart agriculture, weather sensing, intrusion detection applications and industrial control [7,12]. In urban and suburban contexts, these networks are o en connected one to each other, enabling management control over complex scenarios.…”
Section: Introductionmentioning
confidence: 99%