DEPLOYMENT OF NODES IN WSNs
DOI:
https://doi.org/10.18623/rvd.v22.n3.3445Palavras-chave:
WSN Technology, System Monitoring, Sensor Node, Advanced Sensing Functionalities, Routing Protocol, Path SelectionResumo
The Internet of Things (IoT) facilitates widespread automation, simplifying human life by deploying sensors in interconnected environments. Recent developments in Micro Electro Mechanical Systems (MEMS) with technical advancements in terms of performance and miniaturization, wireless communications, and digital electronics have made it possible to produce small, inexpensive, and "smart" devices, including smartphones, PDAs, RFID systems, Wireless Sensor Networks (WSNs), and many other technologies to offer economically viable solutions for remote monitoring and data processing in complex and distributed environments. Strategy of communication and architecture of node, the model within the operation of the system monitoring assisted by sensor nodes in WSNs, their basic concepts, and manner of communication, also the way in which data is transmitted over a wireless link will be presented in this chapter to unite the necessities of a specific application.
Referências
Akyildiz, I. F. (2002). Wireless sensor networks: a survey. Computer Networks (Elsevier) google schola, 2, 6-14.
ATHMANI, Samir. Protocole de sécurité Pour les Réseaux de capteurs Sans Fil. 2010. Thèse de doctorat. Université de Batna 2.
EDDINE, Boubiche Djallel. Protocole de routage pour les réseaux de Capteurs Sans fil» mémoire de Magistère en Informatique. Université de l’Hadj Lakhdar-Batna Faculté des sciences de l’ingénieur, 2008.
KAMEL, Beydoun. Conception d’un protocole de routage hiérarchique pour les réseaux de capteurs. 2009. Thèse de doctorat. Thèse de Doctorat, Universite de franche-comte.
BELUCH, Thomas. High precision synchronized mac-phy cross-layer designed wireless sensor networks. 2013. Thèse de doctorat. Toulouse, INSA.
Boujaada, S., Qaraai, Y., Agoujil, S., & Hajar, M. (2016). Protector Control PC-AODV-BH in The Ad Hoc Networks. arXiv preprint arXiv:1606.02534.
Belfkih, A., Sadeg, B., Duvallet, C., & Amanton, L. (2014). Les bases de données dans les réseaux de capteurs sans fil. Tech. Sci. Informatiques, 33(9-10), 739-776.
Shebli, F. (2008). Réseaux de capteurs sans fil : minimisation de la consommation d'énergie et application à la localisation de cibles (Doctoral dissertation, Valenciennes).
Jingjing, Z., Tongyu, Y., Jilin, Z., Guohao, Z., Xuefeng, L., & Xiang, P. (2022). Intrusion Detection Model for Wireless Sensor Networks Based on MC‐GRU. Wireless Communications and Mobile Computing, 2022(1), 2448010.
Boubiche, D. E. (2013). Une approche Inter-Couches (cross-layer) pour la Sécurité dans les RCSF (Doctoral dissertation, Université de Batna 2).
Hanane, F., & Sabrina, C. (2011). Le routage dans les réseaux de capteurs sans fil (Doctoral dissertation, Université Mouloud Mammeri).
Uzougbo, O. I., Ajibade, S. S. M., & Taiwo, F. (2020). An overview of wireless sensor network security attacks: mode of operation, severity and mitigation techniques. arXiv preprint arXiv:2011.06779.
Akourmis, S., Fakhri, Y., & Rahmani, M. D. (2020). Design Model and Deployment Fashion of Wireless Sensor Networks. In Wireless Sensor Networks-Design, Deployment and Applications. IntechOpen.
FELLAH, K. S., & BEHIH, M. (2021). Analyse les performances d’un routage aléatoire sur les réseaux de capteurs sans fil (Doctoral dissertation, Université Ibn Khaldoun-Tiaret-).
Dâmaso, A., Rosa, N., & Maciel, P. (2014). Reliability of wireless sensor networks. Sensors, 14(9), 15760-15785.
Makhoul, A. (2008). Réseaux de capteurs : localisation, couverture et fusion de données (Doctoral dissertation, Besançon).
Challal, Y. (2008). Réseaux de capteurs sans fils. Cours, Systèmes Intelligents pour le Transport, Université de Technologie de Compiègne, France, 17.
Abdulwahhab, A. R., Salleh, M. F. M., Akb, M. F., & Abdullah, M. N. (2025). Intelligent Intrusion Detection in Clustered Wireless Sensor Networks: A Dynamic Clustering and Machine Learning-Based Approach. Iraqi Journal for Computer Science and Mathematics, 6(2), 30.
Zadeh, M. V., Fadayie, F., & Mirzaei, A. A comprehensive analysis of security in wireless sensor networks, including an examination of lightweight cryptography, artificial intelligence-based cryptography, and machine learning solutions.
Yaras, S., & Dener, M. (2024). IoT-based intrusion detection system using new hybrid deep learning algorithm. Electronics, 13(6), 1053.
Downloads
Publicado
Como Citar
Edição
Seção
Licença
Submeto (emos) o presente trabalho, texto original e inédito, de minha (nossa) autoria, à avaliação de Veredas do Direito - Revista de Direito, e concordo (amos) que os direitos autorais a ele referentes se tornem propriedade exclusiva da Revista Veredas, sendo vedada qualquer reprodução total ou parcial, em qualquer outra parte ou outro meio de divulgação impresso ou eletrônico, dissociado de Veredas do Direito, sem que a necessária e prévia autorização seja solicitada por escrito e obtida junto ao Editor-gerente. Declaro (amos) ainda que não existe conflito de interesse entre o tema abordado, o (s) autor (es) e empresas, instituições ou indivíduos.
Reconheço (Reconhecemos) ainda que Veredas está licenciada sob uma LICENÇA CREATIVE COMMONS:
Licença Creative Commons Attribution 3.0


