2014
DOI: 10.1007/978-3-642-55029-4_4
|View full text |Cite
|
Sign up to set email alerts
|

On the Cooperation between Mobile Robots and Wireless Sensor Networks

Abstract: Abstract. Employing cooperative heterogeneous systems can enrich application scenarios and achieve higher application performance. The combination of mobile robots and Wireless Sensor Networks (WSNs) is a good example of such cooperation, and many recent research results have highlighted the benefits of the marriage of these two technologies. The main objectives of this chapter include: (1) providing a survey on a variety of applications with cooperating mobile robots and WSNs based on the roles they play for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 54 publications
(53 reference statements)
0
6
0
Order By: Relevance
“…For our discussion, consider data collection in WSN (wireless sensor network) using a UAV (unmanned aerial vehicle), as shown in Figure 1. This example is motivated by Shih et al [35] To secure communication among the network nodes, one option is to apply a security solution purely based on SSL/TLS. This approach, however, will run into the following issues.…”
Section: Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…For our discussion, consider data collection in WSN (wireless sensor network) using a UAV (unmanned aerial vehicle), as shown in Figure 1. This example is motivated by Shih et al [35] To secure communication among the network nodes, one option is to apply a security solution purely based on SSL/TLS. This approach, however, will run into the following issues.…”
Section: Motivationmentioning
confidence: 99%
“…For instance, consider SESSION_KEY_REQUEST, which corresponds to a set of messages that an entity sends to an Auth (with id) in order to request a session key for communicating to another entity (identified by target); here, we only depict the case in which the sender does not possess a distribution key. The definition of SESSION_KEY_REQUEST requires that both the names of the sender and target entities are encrypted using the receiving Auth's public key, and then signed with the sender's private key (lines [35][36]. When Auth receives the message, it allocates a new symmetric key (newKey) and inserts it into its current list of session keys and their owners (lines 37-39) 16 .…”
Section: Modeling Auth In Alloymentioning
confidence: 99%
See 1 more Smart Citation
“…Orchestrating heterogeneous Cooperating Objects (COs) can enrich application scenarios by exploiting different characteristics specific to each type of COs, e.g., wireless sensors, Unmanned Ground-and Aerial Vehicles (UGVs and UAVs) [1]. Stationary Wireless Sensor Networks (WSNs) are typically used for providing physical parameter measurements in a monitored area [2] .…”
Section: Introductionmentioning
confidence: 99%
“…UAVs play a prominent role in a variety of real world applications like homeland defense and security, natural disaster recovery, real-time surveillance, among others. UAVs and WSNs can cooperate in a number of different ways to improve network efficiency and performance [ 10 , 11 , 12 , 13 , 14 ]. Benefits can be identified in both directions.…”
Section: Introductionmentioning
confidence: 99%