2020 10th Annual Computing and Communication Workshop and Conference (CCWC) 2020
DOI: 10.1109/ccwc47524.2020.9031271
|View full text |Cite
|
Sign up to set email alerts
|

Node Replacement Method for Disaster Resilient Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 13 publications
0
1
0
Order By: Relevance
“…However, WSNs obtain data from vulnerable deployment environments through the Internet or sensor actuators. WSNs are usually deployed in several applications such as battlefield surveillance, disaster recovery [2], healthcare applications [3], homeland to realistic situations from a privacy-preserving secure data aggregation security standpoint. False sub-aggregate values are a security threat for the WSNs created by compromised sensor nodes.…”
Section: Introductionmentioning
confidence: 99%
“…However, WSNs obtain data from vulnerable deployment environments through the Internet or sensor actuators. WSNs are usually deployed in several applications such as battlefield surveillance, disaster recovery [2], healthcare applications [3], homeland to realistic situations from a privacy-preserving secure data aggregation security standpoint. False sub-aggregate values are a security threat for the WSNs created by compromised sensor nodes.…”
Section: Introductionmentioning
confidence: 99%