2011
DOI: 10.1016/j.adhoc.2010.09.008
|View full text |Cite
|
Sign up to set email alerts
|

BorderSense: Border patrol through advanced wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
118
0
1

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 277 publications
(119 citation statements)
references
References 38 publications
0
118
0
1
Order By: Relevance
“…Barrier coverage with wireless sensors concentrates on detecting intruders that attempt to penetrate a specific area [18], [19], where a chain of sensor nodes are deployed on or along the virtual border to form a network [20]. With the requirement of protecting sensitive facilities and national borders increasing, barrier coverage has a growing number of applications.…”
Section: Related Workmentioning
confidence: 99%
“…Barrier coverage with wireless sensors concentrates on detecting intruders that attempt to penetrate a specific area [18], [19], where a chain of sensor nodes are deployed on or along the virtual border to form a network [20]. With the requirement of protecting sensitive facilities and national borders increasing, barrier coverage has a growing number of applications.…”
Section: Related Workmentioning
confidence: 99%
“…Underground sensor networks consist of sensors that are buried in and communicate through dense materials like soil or concrete. Such networks can be used for soil moisture reporting in agriculture [43], infrastructure supervision, intrusion detection [44] and transport systems [45]. Underwater sensor networks rely on immersed sensors and are used in a variety of applications such as ocean supervision [46], water quality monitoring [47], disaster prevention, surveillance [48] and pipeline monitoring.…”
Section: Underground and Underwater Sensor Networkmentioning
confidence: 99%
“…Networks of small unmanned aerial vehicles 1 (UAVs) can also be employed for wildfire monitoring [1], border surveillance [2], and for extending ad hoc networks on the ground [3], [4], [5].…”
Section: Introductionmentioning
confidence: 99%