2008 the Fourth International Conference on Wireless and Mobile Communications 2008
DOI: 10.1109/icwmc.2008.53
|View full text |Cite
|
Sign up to set email alerts
|

Wireless Sensor Networks for Surveillance Applications – A Comparative Survey of MAC Protocols

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(13 citation statements)
references
References 6 publications
0
13
0
Order By: Relevance
“…7-As shown in Figure 1, each node near the base station as nodes 1, 2 and 3 will form a group from its downstream nodes as nodes 4, 5, 6, 7, 8, 9, 10, 11 and 12. Then, each node of the nodes 4, 5 and 6 from the first group will form a group from its downstream nodes as nodes 13,14,15,16,17,18,19, 20 and 21. Also, each node of nodes 7, 8 and 9 from the second group will form a group from its downstream nodes as nodes 22, 23, 24, 25, 26, 27, 28, 29 and 30.…”
Section: Methodology To Build the Overlapped Groupsmentioning
confidence: 99%
See 1 more Smart Citation
“…7-As shown in Figure 1, each node near the base station as nodes 1, 2 and 3 will form a group from its downstream nodes as nodes 4, 5, 6, 7, 8, 9, 10, 11 and 12. Then, each node of the nodes 4, 5 and 6 from the first group will form a group from its downstream nodes as nodes 13,14,15,16,17,18,19, 20 and 21. Also, each node of nodes 7, 8 and 9 from the second group will form a group from its downstream nodes as nodes 22, 23, 24, 25, 26, 27, 28, 29 and 30.…”
Section: Methodology To Build the Overlapped Groupsmentioning
confidence: 99%
“…In [12], a couple based compromised node detection protocol is proposed to build couples of sensor nodes where the couple can monitor each other but this scheme cannot be used against collaborative work of attackers to compromise large number of nodes because attackers can collect the couples at the same time. Also, software-based attestation techniques [13]- [18] have been proposed to verify the contents of the code running on nodes where the node's free memory space is filled with incompressible random noise known to the attester. These techniques use a challenge-response protocol between a trusted verifier and nodes.…”
Section: Related Workmentioning
confidence: 99%
“…They can be instrumental resources in investigating WLAN and WSN for the smart grid. Issues include time synchronization [79], power consumption [80], medium access control (MAC) [81], [82], routing and fault-tolerance [83], [84], data aggregation and clustering [85]- [87], coverage and connectivity [88], [89], multimedia [90], [91], QoS [92], as well as security and privacy [93]- [95].…”
Section: ) Wireline (Or Wired) Technologiesmentioning
confidence: 99%
“…WSNs have emerged as a feasible solution for a wide range of applications in military, environment monitoring, healthcare, etc [7], [8]. In almost all applications, the knowledge of sensors locations is essential, since sensed data are directly related to the place where measurements are made.…”
Section: Introductionmentioning
confidence: 99%