2022
DOI: 10.1155/2022/7823481
|View full text |Cite
|
Sign up to set email alerts
|

WSN Architectures for Environmental Monitoring Applications

Abstract: Wireless sensor networks (WSNs) have become ubiquitous, permeating every aspect of human life. In environmental monitoring applications (EMAs), WSNs are essential and provide a holistic view of the deployed environment. Physical sensor devices and actuators are connected across a network in environmental monitoring applications to sense vital environmental factors. EMAs bring together the intelligence and autonomy of autonomous systems to make intelligent decisions and communicate them using communication tech… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 64 publications
0
2
0
Order By: Relevance
“…Cybercriminals often use phishing emails, social engineering, and other deceptive tactics to trick individuals into divulging sensitive information such as login credentials or account details. Phishing and social engineering attacks stand as pervasive threats in the financial sector, exploiting human vulnerabilities to gain unauthorized access to sensitive information [102]- [104]. In these sophisticated schemes, malicious actors employ deceptive emails, messages, or phone calls to trick individuals into disclosing confidential financial details or login credentials.…”
Section: Phishing and Social Engineering Attacksmentioning
confidence: 99%
“…Cybercriminals often use phishing emails, social engineering, and other deceptive tactics to trick individuals into divulging sensitive information such as login credentials or account details. Phishing and social engineering attacks stand as pervasive threats in the financial sector, exploiting human vulnerabilities to gain unauthorized access to sensitive information [102]- [104]. In these sophisticated schemes, malicious actors employ deceptive emails, messages, or phone calls to trick individuals into disclosing confidential financial details or login credentials.…”
Section: Phishing and Social Engineering Attacksmentioning
confidence: 99%
“…In the era of modern technology, WSNs play an essential role in a wide range of applications, including environmental monitoring, disaster management, agriculture, and industrial processes [1], [2], [3], [4], [5], [6], [7], [8]. The primary objective of this research is to enhance the energy efficiency and QoS in WSNs.…”
Section: Introductionmentioning
confidence: 99%