Review of Wireless Sensor Networks
This article presents a study of the state of the art of sensor networks wireless systems, which continue to develop and present a wide variety of Applications. These networks constitute a current and emerging field of study where combines the development of computers, wireless communications and devices mobile phones and integration with other disciplines such as agriculture, biology, medicine, etc. I know presents the main concept, components, topologies, standards, applications, problems and challenges, then delves into security solutions and concludes with basic simulation tools.
Corral I. & Ana Belén. (2005). Design and implementation of a simulation environment for sensor networks wireless [Engineering from Telecommunication]. Polytechnic University of Cartagena.
RAAP. (2020). Wireless sensor networks.
Gomez M., Francisco. (2021). Sensor networks wireless.
Schaeffer Elisa. (2015). A look at the basics of optimization of sensor networks.
Franco B., Carlos. (2021). Trends: Wireless sensor networks.
TOSSIM. Available at: http://www.tinyos.net/.
Ruiz M., Pedro. (2020). Introduction to sensor networks. Available at: http://ants.dif.um.es/rm/.
Zigbee Alliance. Available on: http://www.zigbee.org/.
Vinagre D. & Juan José. (2007). Routing theory in wireless ad hoc networks. Doctoral Thesis, Carlos III University of Madrid.
I. Mironov. (2005). Hash functions: Theory, attacks, and applications. Microsoft Research, Silicon Valley Campus.
L. Lamport. (1981). Password authentication with insecure communication. Commun. ACM, 24(11).
S. Emre Taşçı, E. Bayramoğlu, & A. Levi. (2008). Simple and flexible random key predistribution schemes for wireless sensor networks using deployment knowledge. In: International Conference on Information Security and Assurance.
W. Du, J. Deng, YS Han, S. Chen, & PK Varshney. (2004). A key management scheme for wireless sensor networks using deployment knowledge. IEEE Infocom.
Y. Ho Kim, H. Lee, & D. Hoon Lee. (2007). A secure and efficient key management scheme for wireless sensor networks. In: Security and Privacy in Communications Networks and the Workshops, Secure Comm 2007. Third International Conference, pp. 17-21.
J. Young Chun, Y. Ho Kim, J. Lim, & D. Hoon Lee. (2007). Location-aware random pair-wise keys scheme for wireless sensor networks. In: Third International Workshop on Security Privacy and Trust in Pervasive and Ubiquitous Computing.
J. Luo, P. Papadimitratos, & JP. Hubaux. (2008). GossiCrypt: Wireless sensor network data confidentiality against parasitic adversaries. In: 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
X. Yi, M. Faulkner, & E. Okamoto. (2008). Securing wireless sensor networks. In: Third International Conference on Availability, Reliability and Security.
MIT open Course Aware, Chapter 7: Introduction to finite fields. Electrical Engineering and Science Computing.
A. Shamir. (1979 Nov). How to share a secret. Communications of the ACM, 22(11), 656-715.
A. Hamid, M. Mahbub Alam, & C. Seon Hong. (2007 Feb). Developing a security protocol based on LCG and orthogonal matrices for wireless sensor networks. The 9th International Conference on Advanced Communication Technology.
DE Knuth. (1985). Deciphering a linear congruential encryption. IEEE Transactions on Information Theory, IT-X(1), 49-52.
Copyright (c) 2021 International Journal of Engineering and Management Research
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.