[HTML][HTML] Key less physical layer security for wireless networks: A survey

MS Kumar, R Ramanathan, M Jayakumar - Engineering Science and …, 2022 - Elsevier
Physical layer security (PLS) has become the kernel concept for ensuring wireless network
security. The main goal of this treatise is to provide a systematic classification of key less …

Piezoelectric energy harvesting system suitable for remotely placed sensors with inter-digitated design

SD Sreeja, S Gopalan, CO Sreekala - AIP Conference Proceedings, 2019 - pubs.aip.org
Powering of remotely placed sensors or health monitoring devices for bridges, large
buildings or aircrafts, are more difficult. Here comes the need of an energy harvesting …

QoS Evaluation of Wireless Sensor Networks for Toxic Gas Monitoring in Volcanic Areas: A Test-Bed Study of LoRa Communication using Master Slave TDD Method

IS Faradisa, BRPD Palevi, KA Widodo… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
This research discusses the significance of monitoring toxic gases around volcanoes, with a
focus on the implementation and evaluation of three communication protocol models in a …

Optimizing Design of Surface Acoustic Wave Gas Sensor

AS Midhuna, BS SD… - 2021 5th International …, 2021 - ieeexplore.ieee.org
An acoustic wave which propagates along the surface of a solid material is considered as
the Surface acoustic wave (SAW). The surface acoustic gas sensor comprises of a …

[PDF][PDF] A model to manage smart devices in mobile sensing applications

N Bessis - 2021 - academia.edu
The growth in the number and complexity of new smart devices has been exponential in
recent years. With the increasing understanding and application of artificial intelligence and …

Analysis of anisotropic wireless sensor network's range-free localization techniques based on salps swarm algorithm

E George, S Kirthiga - 2022 7th International Conference on …, 2022 - ieeexplore.ieee.org
Node localization in a wireless sensor network (WSN) seeks to compute the positions of
unknown nodes (regular node) using known nodes (anchor nodes). The accuracy with …

Empowering Secure and Authenticated Multi-WSN Communication Through a Hybrid Blockchain Framework

GL Ayyanki, M Khanna - International Conference on Advances in Data …, 2023 - Springer
Security has long been a paramount concern for IoT devices due to their frequent exposure
to hostile environments. Ensuring the authenticity of the hub is a crucial means of upholding …

[PDF][PDF] Informationally-technological provision of environmental nature reserves monitoring.

O Tymchenko, B Havrysh, O Khamula, B Kovalskyi… - IntelITSIS, 2024 - ceur-ws.org
Modern approaches to environmental protection do not always meet the requirements of
science and are often based on the principles of prohibition rather than rational use of …

Design and Implementation of Direct Memory Access & Compression in PSoC5LP

A Gopinath, C Arun, A Hanumanthaiah - Recent Trends in Electronics and …, 2022 - Springer
For critical applications like remote disaster monitoring, reliable streaming of sensor data is
very important. In addition to this, the system has to process a large amount of data for …