Securing a wireless sensor network for human tracking: a review of solutions
SUMMARYCurrently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and m...
Gespeichert in:
Veröffentlicht in: | International journal of communication systems 2014-12, Vol.27 (12), p.4384-4406 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 4406 |
---|---|
container_issue | 12 |
container_start_page | 4384 |
container_title | International journal of communication systems |
container_volume | 27 |
creator | Carrasco, Alejandro Alcaraz, Francisco Barbancho, Julio Larios, Diego F. Luis Sevillano, Jose |
description | SUMMARYCurrently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario. Copyright © 2013 John Wiley & Sons, Ltd.
Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario. |
doi_str_mv | 10.1002/dac.2621 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1651456422</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1651456422</sourcerecordid><originalsourceid>FETCH-LOGICAL-c4311-3f18ef951be8864c45070700c27232a73e8c466e2648c4afb77c5bf609e515bb3</originalsourceid><addsrcrecordid>eNp10FFLwzAQB_AiCs4p-BEKvvjSmUuatPVtTN0cQxEVH0Mar9qta2bSWvftzZgoCnIP93_4cRz_IDgGMgBC6Nmz0gMqKOwEPSBZFgEw2N3kJI4447AfHDg3J4SkVPBeMLtH3dqyfglV2JUWK3QudFg7Y8Mam87YRVj4_NouVR02VumFx-deW3wvsQtNETpTtU1pancY7BWqcnj0tfvB49Xlw2gSzW7H16PhLNIxA4hYASkWGYcc01TEOuYk8UM0TSijKmGY6lgIpCL2QRV5kmieF4JkyIHnOesHp9u7K2veWnSNXJZOY1WpGk3rJAgOMRcxpZ6e_KFz09raf-cVzTgHmvKfg9oa5ywWcmXLpbJrCURuapW-Vrmp1dNoS7uywvW_Tl4MR7996Rr8-PbKLqRIWMLl081YTqeTu9GUjyVnn0ImhfQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1629551285</pqid></control><display><type>article</type><title>Securing a wireless sensor network for human tracking: a review of solutions</title><source>Wiley Online Library Journals Frontfile Complete</source><creator>Carrasco, Alejandro ; Alcaraz, Francisco ; Barbancho, Julio ; Larios, Diego F. ; Luis Sevillano, Jose</creator><creatorcontrib>Carrasco, Alejandro ; Alcaraz, Francisco ; Barbancho, Julio ; Larios, Diego F. ; Luis Sevillano, Jose</creatorcontrib><description>SUMMARYCurrently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario. Copyright © 2013 John Wiley & Sons, Ltd.
Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario.</description><identifier>ISSN: 1074-5351</identifier><identifier>EISSN: 1099-1131</identifier><identifier>DOI: 10.1002/dac.2621</identifier><language>eng</language><publisher>Chichester: Blackwell Publishing Ltd</publisher><subject>Flexibility ; Human ; localization ; Military applications ; Remote sensors ; Security ; Tracking ; tracking, localization ; Tradeoffs ; Wireless networks ; wireless sensor networks</subject><ispartof>International journal of communication systems, 2014-12, Vol.27 (12), p.4384-4406</ispartof><rights>Copyright © 2013 John Wiley & Sons, Ltd.</rights><rights>Copyright © 2014 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c4311-3f18ef951be8864c45070700c27232a73e8c466e2648c4afb77c5bf609e515bb3</citedby><cites>FETCH-LOGICAL-c4311-3f18ef951be8864c45070700c27232a73e8c466e2648c4afb77c5bf609e515bb3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fdac.2621$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fdac.2621$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,776,780,1411,27901,27902,45550,45551</link.rule.ids></links><search><creatorcontrib>Carrasco, Alejandro</creatorcontrib><creatorcontrib>Alcaraz, Francisco</creatorcontrib><creatorcontrib>Barbancho, Julio</creatorcontrib><creatorcontrib>Larios, Diego F.</creatorcontrib><creatorcontrib>Luis Sevillano, Jose</creatorcontrib><title>Securing a wireless sensor network for human tracking: a review of solutions</title><title>International journal of communication systems</title><addtitle>Int. J. Commun. Syst</addtitle><description>SUMMARYCurrently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario. Copyright © 2013 John Wiley & Sons, Ltd.
Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario.</description><subject>Flexibility</subject><subject>Human</subject><subject>localization</subject><subject>Military applications</subject><subject>Remote sensors</subject><subject>Security</subject><subject>Tracking</subject><subject>tracking, localization</subject><subject>Tradeoffs</subject><subject>Wireless networks</subject><subject>wireless sensor networks</subject><issn>1074-5351</issn><issn>1099-1131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><recordid>eNp10FFLwzAQB_AiCs4p-BEKvvjSmUuatPVtTN0cQxEVH0Mar9qta2bSWvftzZgoCnIP93_4cRz_IDgGMgBC6Nmz0gMqKOwEPSBZFgEw2N3kJI4447AfHDg3J4SkVPBeMLtH3dqyfglV2JUWK3QudFg7Y8Mam87YRVj4_NouVR02VumFx-deW3wvsQtNETpTtU1pancY7BWqcnj0tfvB49Xlw2gSzW7H16PhLNIxA4hYASkWGYcc01TEOuYk8UM0TSijKmGY6lgIpCL2QRV5kmieF4JkyIHnOesHp9u7K2veWnSNXJZOY1WpGk3rJAgOMRcxpZ6e_KFz09raf-cVzTgHmvKfg9oa5ywWcmXLpbJrCURuapW-Vrmp1dNoS7uywvW_Tl4MR7996Rr8-PbKLqRIWMLl081YTqeTu9GUjyVnn0ImhfQ</recordid><startdate>201412</startdate><enddate>201412</enddate><creator>Carrasco, Alejandro</creator><creator>Alcaraz, Francisco</creator><creator>Barbancho, Julio</creator><creator>Larios, Diego F.</creator><creator>Luis Sevillano, Jose</creator><general>Blackwell Publishing Ltd</general><general>Wiley Subscription Services, Inc</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>7SC</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>201412</creationdate><title>Securing a wireless sensor network for human tracking: a review of solutions</title><author>Carrasco, Alejandro ; Alcaraz, Francisco ; Barbancho, Julio ; Larios, Diego F. ; Luis Sevillano, Jose</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c4311-3f18ef951be8864c45070700c27232a73e8c466e2648c4afb77c5bf609e515bb3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Flexibility</topic><topic>Human</topic><topic>localization</topic><topic>Military applications</topic><topic>Remote sensors</topic><topic>Security</topic><topic>Tracking</topic><topic>tracking, localization</topic><topic>Tradeoffs</topic><topic>Wireless networks</topic><topic>wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Carrasco, Alejandro</creatorcontrib><creatorcontrib>Alcaraz, Francisco</creatorcontrib><creatorcontrib>Barbancho, Julio</creatorcontrib><creatorcontrib>Larios, Diego F.</creatorcontrib><creatorcontrib>Luis Sevillano, Jose</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of communication systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Carrasco, Alejandro</au><au>Alcaraz, Francisco</au><au>Barbancho, Julio</au><au>Larios, Diego F.</au><au>Luis Sevillano, Jose</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Securing a wireless sensor network for human tracking: a review of solutions</atitle><jtitle>International journal of communication systems</jtitle><addtitle>Int. J. Commun. Syst</addtitle><date>2014-12</date><risdate>2014</risdate><volume>27</volume><issue>12</issue><spage>4384</spage><epage>4406</epage><pages>4384-4406</pages><issn>1074-5351</issn><eissn>1099-1131</eissn><abstract>SUMMARYCurrently, wireless sensor networks (WSNs) are formed by devices with limited resources and limited power energy availability. Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario. Copyright © 2013 John Wiley & Sons, Ltd.
Thanks to their cost effectiveness, flexibility, and ease of deployment, wireless sensor networks have been applied to many scenarios such as industrial, civil, and military applications. For many applications, security is a primary issue, but this produces an extra energy cost. Thus, in real applications, a trade‐off is required between the security level and energy consumption. This paper evaluates different security schemes applied to human tracking applications, based on a real‐case scenario.</abstract><cop>Chichester</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/dac.2621</doi><tpages>23</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1074-5351 |
ispartof | International journal of communication systems, 2014-12, Vol.27 (12), p.4384-4406 |
issn | 1074-5351 1099-1131 |
language | eng |
recordid | cdi_proquest_miscellaneous_1651456422 |
source | Wiley Online Library Journals Frontfile Complete |
subjects | Flexibility Human localization Military applications Remote sensors Security Tracking tracking, localization Tradeoffs Wireless networks wireless sensor networks |
title | Securing a wireless sensor network for human tracking: a review of solutions |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-06T02%3A31%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Securing%20a%20wireless%20sensor%20network%20for%20human%20tracking:%20a%20review%20of%20solutions&rft.jtitle=International%20journal%20of%20communication%20systems&rft.au=Carrasco,%20Alejandro&rft.date=2014-12&rft.volume=27&rft.issue=12&rft.spage=4384&rft.epage=4406&rft.pages=4384-4406&rft.issn=1074-5351&rft.eissn=1099-1131&rft_id=info:doi/10.1002/dac.2621&rft_dat=%3Cproquest_cross%3E1651456422%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1629551285&rft_id=info:pmid/&rfr_iscdi=true |