2015
DOI: 10.17485/ijst/2015/v8i15/74191
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Sensor Network in Disaster Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Currently, WSNs have had applicability in various applications in the real world. They have been set up in monitoring and prompting appropriate disaster management units about impending havoc such as wildfires, floods, tsunamis, earthquakes, and hurricanes [5]; [1]; [6] and for monitoring the strengths and weaknesses of constructed edifices such as roads, buildings and bridges [7] [8]. The life of humans and animals depends largely on availability and purity of water sources particularly for domestic consumption.…”
Section: Application Areas Of Wireless Sensor Networkmentioning
confidence: 99%
“…Currently, WSNs have had applicability in various applications in the real world. They have been set up in monitoring and prompting appropriate disaster management units about impending havoc such as wildfires, floods, tsunamis, earthquakes, and hurricanes [5]; [1]; [6] and for monitoring the strengths and weaknesses of constructed edifices such as roads, buildings and bridges [7] [8]. The life of humans and animals depends largely on availability and purity of water sources particularly for domestic consumption.…”
Section: Application Areas Of Wireless Sensor Networkmentioning
confidence: 99%
“…Wireless Sensor Networks (WSNs) consist of spatially distributed, autonomous, wireless, networked sensing devices that can be used to monitor a physical space (Yick et al 2008;Sharma et al 2016). WSNs have gained increasing popularity for a range of applications, such as environmental monitoring (Khedo et al 2010;Bhattacharya et al 2012;Postolache et al 2014;Adamo et al 2015), animal tracking (Szewczyk et al 2004;Pereira et al 2008;Amundson and Koutsoukos 2009;Radoi et al 2015), monitoring for disasters such as earthquakes, hurricanes, and floods (Estrin et al 2002;Akyildiz et al 2002;Devasena and Sowmya 2015), and health monitoring of civil structures such as bridges and buildings (Lee et al 2007;Kim et al 2007;Hu et al 2013).…”
Section: Introductionmentioning
confidence: 99%
“…Several techniques are used such as symmetric encryption, it depends on the use of a single key in both sides sender node and receiver one, but such methodology is not enough and we need an additional strategy that distinguish a malicious node even if it somehow obtained the key. Building trust between the different nodes is the intended approach [4].…”
Section: Introductionmentioning
confidence: 99%