Peer to peer propagation in vegetation media for wireless sensor networks

Author(s):  
Jose Antonio Gay-Fernandez ◽  
Inigo Cuinas
Sensors ◽  
2007 ◽  
Vol 7 (6) ◽  
pp. 1001-1027 ◽  
Author(s):  
Xue Wang ◽  
Sheng Wang ◽  
Dao-Wei Bi ◽  
Jun-Jie Ma

Automatica ◽  
2015 ◽  
Vol 61 ◽  
pp. 263-273 ◽  
Author(s):  
Yuzhe Xu ◽  
Carlo Fischione ◽  
Alberto Speranzon

2021 ◽  
Vol 11 (6) ◽  
pp. 7867-7874
Author(s):  
U. Iftikhar ◽  
K. Asrar ◽  
M. Waqas ◽  
S. A. Ali

Nowadays, terabytes of digital data are generated and sent online every second. However, securing this extent of information has always been a challenging task. Cryptography is a fundamental method for securing data, as it makes data unintelligible for attackers, offering privacy to authorized clients. Different cryptographic algorithms have different speeds and costs that make them suitable for different applications. For instance, banking applications need outrageous security amenities, as they utilize superior algorithms having greater requirements, while gaming applications focus more on speed and cost reduction. Consequently, cryptographic algorithms are chosen based on a client's prerequisites. This study compared DES, AES, Blowfish, and RSA, examining their speed, cost, and performance, and discussed their adequacy for use in wireless sensor networks and peer-to-peer communication.


2012 ◽  
Vol 45 (26) ◽  
pp. 19-24 ◽  
Author(s):  
Yuzhe Xu ◽  
Carlo Fischione ◽  
Alberto Speranzon

2014 ◽  
Vol 926-930 ◽  
pp. 2102-2105
Author(s):  
Cai Bin Liu ◽  
Guo Hui Wu ◽  
Le He ◽  
Xiao Wei Wang

Research and application on wireless sensor networks in the future counterterrorism operations, including the target perception network, target guiding network, combat command control and the fire control network. Access to information and knowledge through the wireless sensor networks. Counterterrorism capacity can be upgraded, and precision strike over the horizon can be realized. The networks change the classical counterterrorism operations, reconnaissance and security mode. Qualnet simulation results show that packets loss rate of wireless sensor networks is small, and the peer to peer delay is short. The networks is suitable for counterterrorism operations environment.


Sign in / Sign up

Export Citation Format

Share Document