2022
DOI: 10.1007/978-981-19-2211-4_14
|View full text |Cite
|
Sign up to set email alerts
|

Forest Protection by Fire Detection, Alarming, Messaging Through IoT, Blockchain, and Digital Technologies in Thailand Chiang Mai Forest Range

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…[8] stores fire equipment information in blockchain and uses Fabric to implement the traceability function of fire equipment information. [9] uses blockchain to store and pass sensor data to specific units to quickly predict the path of fire points and stop fires, but does not store video surveillance data. Both solutions store fixed information or real-time data via blockchain, which leads to a large storage space requirement.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…[8] stores fire equipment information in blockchain and uses Fabric to implement the traceability function of fire equipment information. [9] uses blockchain to store and pass sensor data to specific units to quickly predict the path of fire points and stop fires, but does not store video surveillance data. Both solutions store fixed information or real-time data via blockchain, which leads to a large storage space requirement.…”
Section: Related Workmentioning
confidence: 99%
“…There are two main data storage solutions for the storage of firefighting IoT data: (1) Traditional solutions, which store the fire sensor information and monitoring video together to the central server [1] [6] [7]; (2) Blockchain-based solutions. Only the fire sensor information is stored in the blockchain, and the fire monitoring video is stored to the central server [8] [9]. The above schemes solve the storage of firefighting IoT data, especially the second solution can effectively ensure the security of sensor data.…”
Section: Introductionmentioning
confidence: 99%