Securing a wireless sensor network for human tracking: a review of solutions

SUMMARYCurrently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and m...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of communication systems 2014-12, Vol.27 (12), p.4384-4406
Hauptverfasser: Carrasco, Alejandro, Alcaraz, Francisco, Barbancho, Julio, Larios, Diego F., Luis Sevillano, Jose
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 4406
container_issue 12
container_start_page 4384
container_title International journal of communication systems
container_volume 27
creator Carrasco, Alejandro
Alcaraz, Francisco
Barbancho, Julio
Larios, Diego F.
Luis Sevillano, Jose
description SUMMARYCurrently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario. Copyright © 2013 John Wiley & Sons, Ltd. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario.
doi_str_mv 10.1002/dac.2621
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1651456422</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1651456422</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4311-3f18ef951be8864c45070700c27232a73e8c466e2648c4afb77c5bf609e515bb3</originalsourceid><addsrcrecordid>eNp10FFLwzAQB_AiCs4p-BEKvvjSmUuatPVtTN0cQxEVH0Mar9qta2bSWvftzZgoCnIP93_4cRz_IDgGMgBC6Nmz0gMqKOwEPSBZFgEw2N3kJI4447AfHDg3J4SkVPBeMLtH3dqyfglV2JUWK3QudFg7Y8Mam87YRVj4_NouVR02VumFx-deW3wvsQtNETpTtU1pancY7BWqcnj0tfvB49Xlw2gSzW7H16PhLNIxA4hYASkWGYcc01TEOuYk8UM0TSijKmGY6lgIpCL2QRV5kmieF4JkyIHnOesHp9u7K2veWnSNXJZOY1WpGk3rJAgOMRcxpZ6e_KFz09raf-cVzTgHmvKfg9oa5ywWcmXLpbJrCURuapW-Vrmp1dNoS7uywvW_Tl4MR7996Rr8-PbKLqRIWMLl081YTqeTu9GUjyVnn0ImhfQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1629551285</pqid></control><display><type>article</type><title>Securing a wireless sensor network for human tracking: a review of solutions</title><source>Wiley Online Library Journals Frontfile Complete</source><creator>Carrasco, Alejandro ; Alcaraz, Francisco ; Barbancho, Julio ; Larios, Diego F. ; Luis Sevillano, Jose</creator><creatorcontrib>Carrasco, Alejandro ; Alcaraz, Francisco ; Barbancho, Julio ; Larios, Diego F. ; Luis Sevillano, Jose</creatorcontrib><description>SUMMARYCurrently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario. Copyright © 2013 John Wiley &amp; Sons, Ltd. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario.</description><identifier>ISSN: 1074-5351</identifier><identifier>EISSN: 1099-1131</identifier><identifier>DOI: 10.1002/dac.2621</identifier><language>eng</language><publisher>Chichester: Blackwell Publishing Ltd</publisher><subject>Flexibility ; Human ; localization ; Military applications ; Remote sensors ; Security ; Tracking ; tracking, localization ; Tradeoffs ; Wireless networks ; wireless sensor networks</subject><ispartof>International journal of communication systems, 2014-12, Vol.27 (12), p.4384-4406</ispartof><rights>Copyright © 2013 John Wiley &amp; Sons, Ltd.</rights><rights>Copyright © 2014 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4311-3f18ef951be8864c45070700c27232a73e8c466e2648c4afb77c5bf609e515bb3</citedby><cites>FETCH-LOGICAL-c4311-3f18ef951be8864c45070700c27232a73e8c466e2648c4afb77c5bf609e515bb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fdac.2621$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fdac.2621$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,776,780,1411,27901,27902,45550,45551</link.rule.ids></links><search><creatorcontrib>Carrasco, Alejandro</creatorcontrib><creatorcontrib>Alcaraz, Francisco</creatorcontrib><creatorcontrib>Barbancho, Julio</creatorcontrib><creatorcontrib>Larios, Diego F.</creatorcontrib><creatorcontrib>Luis Sevillano, Jose</creatorcontrib><title>Securing a wireless sensor network for human tracking: a review of solutions</title><title>International journal of communication systems</title><addtitle>Int. J. Commun. Syst</addtitle><description>SUMMARYCurrently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario. Copyright © 2013 John Wiley &amp; Sons, Ltd. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario.</description><subject>Flexibility</subject><subject>Human</subject><subject>localization</subject><subject>Military applications</subject><subject>Remote sensors</subject><subject>Security</subject><subject>Tracking</subject><subject>tracking, localization</subject><subject>Tradeoffs</subject><subject>Wireless networks</subject><subject>wireless sensor networks</subject><issn>1074-5351</issn><issn>1099-1131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNp10FFLwzAQB_AiCs4p-BEKvvjSmUuatPVtTN0cQxEVH0Mar9qta2bSWvftzZgoCnIP93_4cRz_IDgGMgBC6Nmz0gMqKOwEPSBZFgEw2N3kJI4447AfHDg3J4SkVPBeMLtH3dqyfglV2JUWK3QudFg7Y8Mam87YRVj4_NouVR02VumFx-deW3wvsQtNETpTtU1pancY7BWqcnj0tfvB49Xlw2gSzW7H16PhLNIxA4hYASkWGYcc01TEOuYk8UM0TSijKmGY6lgIpCL2QRV5kmieF4JkyIHnOesHp9u7K2veWnSNXJZOY1WpGk3rJAgOMRcxpZ6e_KFz09raf-cVzTgHmvKfg9oa5ywWcmXLpbJrCURuapW-Vrmp1dNoS7uywvW_Tl4MR7996Rr8-PbKLqRIWMLl081YTqeTu9GUjyVnn0ImhfQ</recordid><startdate>201412</startdate><enddate>201412</enddate><creator>Carrasco, Alejandro</creator><creator>Alcaraz, Francisco</creator><creator>Barbancho, Julio</creator><creator>Larios, Diego F.</creator><creator>Luis Sevillano, Jose</creator><general>Blackwell Publishing Ltd</general><general>Wiley Subscription Services, Inc</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>7SC</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201412</creationdate><title>Securing a wireless sensor network for human tracking: a review of solutions</title><author>Carrasco, Alejandro ; Alcaraz, Francisco ; Barbancho, Julio ; Larios, Diego F. ; Luis Sevillano, Jose</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4311-3f18ef951be8864c45070700c27232a73e8c466e2648c4afb77c5bf609e515bb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Flexibility</topic><topic>Human</topic><topic>localization</topic><topic>Military applications</topic><topic>Remote sensors</topic><topic>Security</topic><topic>Tracking</topic><topic>tracking, localization</topic><topic>Tradeoffs</topic><topic>Wireless networks</topic><topic>wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Carrasco, Alejandro</creatorcontrib><creatorcontrib>Alcaraz, Francisco</creatorcontrib><creatorcontrib>Barbancho, Julio</creatorcontrib><creatorcontrib>Larios, Diego F.</creatorcontrib><creatorcontrib>Luis Sevillano, Jose</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of communication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Carrasco, Alejandro</au><au>Alcaraz, Francisco</au><au>Barbancho, Julio</au><au>Larios, Diego F.</au><au>Luis Sevillano, Jose</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing a wireless sensor network for human tracking: a review of solutions</atitle><jtitle>International journal of communication systems</jtitle><addtitle>Int. J. Commun. Syst</addtitle><date>2014-12</date><risdate>2014</risdate><volume>27</volume><issue>12</issue><spage>4384</spage><epage>4406</epage><pages>4384-4406</pages><issn>1074-5351</issn><eissn>1099-1131</eissn><abstract>SUMMARYCurrently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario. Copyright © 2013 John Wiley &amp; Sons, Ltd. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario.</abstract><cop>Chichester</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/dac.2621</doi><tpages>23</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1074-5351
ispartof International journal of communication systems, 2014-12, Vol.27 (12), p.4384-4406
issn 1074-5351
1099-1131
language eng
recordid cdi_proquest_miscellaneous_1651456422
source Wiley Online Library Journals Frontfile Complete
subjects Flexibility
Human
localization
Military applications
Remote sensors
Security
Tracking
tracking, localization
Tradeoffs
Wireless networks
wireless sensor networks
title Securing a wireless sensor network for human tracking: a review of solutions
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T02%3A31%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20a%20wireless%20sensor%20network%20for%20human%20tracking:%20a%20review%20of%20solutions&rft.jtitle=International%20journal%20of%20communication%20systems&rft.au=Carrasco,%20Alejandro&rft.date=2014-12&rft.volume=27&rft.issue=12&rft.spage=4384&rft.epage=4406&rft.pages=4384-4406&rft.issn=1074-5351&rft.eissn=1099-1131&rft_id=info:doi/10.1002/dac.2621&rft_dat=%3Cproquest_cross%3E1651456422%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1629551285&rft_id=info:pmid/&rfr_iscdi=true