Compusoft, 2 (12), 438-441 PDF
Compusoft, 2 (12), 438-441 PDF
Compusoft, 2 (12), 438-441 PDF
ISSN:2320-0790
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
The first 2 parts are before the disaster and next two parts
are implemented after the disaster.
To Implement WSN for hazardous scenarios we need to
understand some issues related to WSN:
1) Implementation : Implementation can be further
divided into 2 categories:
(ii)
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
WSN architecture:
V.
Conclusion
COMPUSOFT, An international journal of advanced computer technology, 2 (12), December-2013 (Volume-II, Issue-XII)
References:
[1] Information Sharing: A study of Information
attributes and their relative significance during
catastrophic events. Cyber Security and Global
Information Assurance, Kenneth J.Knapp. ISBN 9781-60566-326-5, 2009.
[2] Managing Disaster with Wireless Sensor Networks,
Musaliar College of engineering and technology.
[3] Wireless Sensor for Disaster Management,
Department of Electronics Technology, Guru Nanak
Dev University, Amritsar, Punjab, ISSN 2278-1323,
IJARCET, Volume 1, Issue 5, July 2012
[4] Ad hoc Wireless Sensor Network Architecture for
Disaster Survivor Detection, Naveed Ahmad,
Naveed Riaz, Mureed Husain, IJAST, vol34, sept
2011.
[5] Drought forecast model and framework using
Wireless Sensor Network by Journal of information
science and engineering 22, 751-769, 2006
[6] How secure is your Wireless Network? Safeguarding
your wi-fi LAN, Lee Barken, 2004
[7] Literature Survey on Wireless Sensor Networks-July
16, 2003.
[8] Wireless Sensor Network Security, A survey Security
in Distributed Grid and Pervasive computing. Yang
Xiao, (Eds) pp. 2006, Auerbach Publication, CRC
Press
[9] A Survey on Secure Localization in Wireless Sensor
Networks: Avinash Srinivasan & Florida Atlantic
University, FL USA.
[10] Localization of Wireless Sensor Nodes Using
Proximity Information, Piyush Agarwal and
R.K.Ghosh , Department of CSE, IIT Kanpur,
Sajal.K das, Department of CSE, The University of
Texas at Arlington, USA, IEEE, 2007
441