2008
DOI: 10.1080/00207720802085138
|View full text |Cite
|
Sign up to set email alerts
|

Networked control systems and wireless sensor networks: theories and applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0
1

Year Published

2010
2010
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(12 citation statements)
references
References 0 publications
0
11
0
1
Order By: Relevance
“…A WSN usually consists of a group of autonomous sensor nodes with wireless communication capabilities [46] and can be deployed at diverse locations (e.g., indoor or remote areas. Usually remote areas are difficult for human beings to reach) for a variety of purposes such as industrial control and monitoring, home automation and consumer electronics, security and military sensing, asset tracking and supply chain management, intelligent agriculture and health monitoring [46].…”
Section: Wireless Sensor Networkmentioning
confidence: 99%
“…A WSN usually consists of a group of autonomous sensor nodes with wireless communication capabilities [46] and can be deployed at diverse locations (e.g., indoor or remote areas. Usually remote areas are difficult for human beings to reach) for a variety of purposes such as industrial control and monitoring, home automation and consumer electronics, security and military sensing, asset tracking and supply chain management, intelligent agriculture and health monitoring [46].…”
Section: Wireless Sensor Networkmentioning
confidence: 99%
“…On the other hand, external attacks are carried out through snooping and injecting fractional data into wireless networks. These attacks are further classified into logical network layers (application, transport, network, data link and physical layers) depending upon the type of attack made (Yang, 2014). The number of attacks which targeted the application layer, and the total number of attacks suffered by WSNs, are classified by Li and Gong (2008), López and Zhou (2008), Araujo et al (2012), Lopez et al (2010), Ali et al (2015).…”
Section: Security -Different Types Of Vulnerability Impacting Wsnsmentioning
confidence: 99%
“…The base station utilizes either public or dedicated communication links connected to a sensor network task manager (Boukerch et al, 2007;Chen et al, 2007b;Khalid et al, 2013;Sarobin & Ganesan, 2016). WSNs possess many benefits, including their low-cost, low-power, robustness, durability, small size, ease of deployment and multi-function ability (Yang & Cao, 2008;Yick et al, 2008;Li & Gong, 2008;Lasol & Pornpromlikit, 2016). Due to their extensive utilization and benefits, these sensors are frequently deployed in places such as deep water, battlefields, forests, airports and extreme temperature environments, which were very difficult to monitor in the past.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations