2016 International Conference System Modeling &Amp; Advancement in Research Trends (SMART) 2016
DOI: 10.1109/sysmart.2016.7894511
|View full text |Cite
|
Sign up to set email alerts
|

Noticeable key points and issues of sensor deployment for large area Wireless Sensor Network: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…In [ 98 ], some challenges, such as security, routing of data, etc., were studied in addition to application types of WSN. Reference [ 99 ] discussed most of the factors that should be considered when planning WSN deployment for targeted usage. These factors include the communication range of nodes, sensing range, deployment strategy, etc.…”
Section: State-of-the-artmentioning
confidence: 99%
“…In [ 98 ], some challenges, such as security, routing of data, etc., were studied in addition to application types of WSN. Reference [ 99 ] discussed most of the factors that should be considered when planning WSN deployment for targeted usage. These factors include the communication range of nodes, sensing range, deployment strategy, etc.…”
Section: State-of-the-artmentioning
confidence: 99%
“…If a WSN consists of a cluster, false report insertion attacks are divided into two cases when the cluster head (CH) node that generates the report is compromised and when the member (MB) node that creates the authentication key is compromised. If the CH node is compromised, the attacker generates an arbitrary report and transmits it to the next node, causing false notification and energy exhaustion problems of intermediate nodes in the routing path [5][6]. If the MB node is compromised, it can generate a false event notification to the CH node, depleting the node energy of the cluster region and deploy incapacitating nodes.…”
Section: Figure 1: False Report Injection Attackmentioning
confidence: 99%
“…False Report Injection attacks can exhaust all the energy of the all nodes in repetitive attacks. This problem reduces the networks lifetime or disables the networks [10][11][12]. In addition, The BS informs the user of the wrong information and causes confusion and time loss.…”
Section: Introductionmentioning
confidence: 99%