2015
DOI: 10.1088/1742-6596/574/1/012153
|View full text |Cite
|
Sign up to set email alerts
|

Influence of Mobility Models in Precision Spray Aided by Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…After considering the implementation of WSN in agriculture [ 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 ] as a distributed system, we researched attacks on the WSN [ 23 , 24 , 25 , 34 , 35 , 36 , 37 ]. Attacks on WSN exploit vulnerabilities in all layers of network communication architecture, while disrupting security requirements, such as authentication, authorization, data integrity, data trustworthiness, availability, non-repudiation, trust, and privacy [ 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ].…”
Section: Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…After considering the implementation of WSN in agriculture [ 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 , 18 , 19 , 20 , 21 ] as a distributed system, we researched attacks on the WSN [ 23 , 24 , 25 , 34 , 35 , 36 , 37 ]. Attacks on WSN exploit vulnerabilities in all layers of network communication architecture, while disrupting security requirements, such as authentication, authorization, data integrity, data trustworthiness, availability, non-repudiation, trust, and privacy [ 25 , 26 , 27 , 28 , 29 , 30 , 31 , 32 ].…”
Section: Methodsmentioning
confidence: 99%
“…Simultaneously, the message goes through a hash transformation as with the sender, SNA node. Then, obtained hash values are compared (11), and if the comparison is all right, then the message integrity, authenticity, and non-repudiation are preserved. If contrary, the message was modified in the process of transmission or was sent by somebody else.…”
Section: Case Study Example For the Application Of The Model In The Imentioning
confidence: 99%
See 1 more Smart Citation
“…The feasibility of deploying WSNs at low cost has made these systems highly desirable for military, agriculture, sports, medicine, and industry. The potential applications of WSNs as cost-effective processes to improve agricultural resource management have been reported: irrigation management systems [3], farming systems monitoring [4][5][6], pest and disease control [7], controlled use of fertilizers [8], cattle movement monitoring [9], groundwater quality monitoring [10], greenhouse gases monitoring [11], asset tracking [12], and remote control and diagnosis [13,14]. The most promising applications for WSN in precision agriculture are irrigation management, farming monitoring, disease control, and fertilizer accuracy [15].…”
Section: Introductionmentioning
confidence: 99%