About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
6th International ICST Symposium on Modeling and Optimization

Research Article

Wireless sensor networks of battlefields hotspot: Challenges and solutions

Download925 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.4108/ICST.WIOPT2008.2983,
        author={Naif Alsharabi and Li Ren Fa and Fan Zing and Mossa Ghurab},
        title={Wireless sensor networks of battlefields hotspot: Challenges and solutions},
        proceedings={6th International ICST Symposium on Modeling and Optimization},
        publisher={IEEE},
        proceedings_a={WIOPT},
        year={2008},
        month={8},
        keywords={sensor attacker security energy battlefield},
        doi={10.4108/ICST.WIOPT2008.2983}
    }
    
  • Naif Alsharabi
    Li Ren Fa
    Fan Zing
    Mossa Ghurab
    Year: 2008
    Wireless sensor networks of battlefields hotspot: Challenges and solutions
    WIOPT
    IEEE
    DOI: 10.4108/ICST.WIOPT2008.2983
Naif Alsharabi1,*, Li Ren Fa1,*, Fan Zing1, Mossa Ghurab2,*
  • 1: College of Computer and Communication Engineering, Hunan University, Hunan, Changsha, 410082, CHINA.
  • 2: College of Computer Science, Zhejiang University, Zhejiang Province, Hangzhou, CHINA.
*Contact email: Sharabi28@hotmail.com, lirenfa@vip.sina.com, mossaghurab@hotmail.com

Abstract

in recent years, a lot of research is focused on wireless sensor network applications, which is focused on field of performance, security, and energy. This paper addressed the difficulties and challenges facing the wireless sensor networks on the battlefield. Which is often vulnerable to attacker’s networks either in the data or corrupting control devices and attempt to consume a lot of energy by sending a large quantity of useless packets, which contributes to excessive consumption of energy and leads to exit nodes from work. Since technology has become widespread on battlefields at the present time, then the sensor nodes are vulnerable to attackers from both sides. This research discussed many challenges and gave appropriate solutions. The simulations showed that these solutions can help secure data and saved 40% of energy consumed.

Keywords
sensor, attacker, security, energy, battlefield
Published
2008-08-01
Publisher
IEEE
Modified
2010-05-16
http://dx.doi.org/10.4108/ICST.WIOPT2008.2983
Copyright © 2008–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL