- Table View
- List View
Wireless Sensor Networks: Principles and Practice
by Fei Hu Xiaojun CaoWritten by award-winning engineers whose research has been sponsored by the U.S. National Science Foundation (NSF), IBM, and Cisco's University Research Program, Wireless Sensor Networks: Principles and Practice addresses everything product developers and technicians need to know to navigate the field. It provides an all-inclusive examina
Wireless Sensor Networks: Current Status and Future Trends
by Shafiullah Khan Al-Sakib Khan Pathan Nabil Ali AlrajehWireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human intelligence capability of sensing on a wider distributed scale. But acquiring data from the deployment area of a WSN is not always easy and multiple issues arise, including the limited resources of sensor devices run with one-time batteries. Additi
Wireless Sensor Networks: 13th China Conference, CWSN 2019, Chongqing, China, October 12–14, 2019, Revised Selected Papers (Communications in Computer and Information Science #1101)
by Kai Liu Chao Chen Songtao Guo Hongyu HuangThis book constitutes the refereed proceedings of the 13th China Conference on Wireless Sensor Networks, CWSN 2019, held in Chongqing, China, in October 2019. The 27 full papers were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on fundamentals on Internet of Things; applications on Internet of Things; and IntelliSense, location and tracking.
Wireless Sensor Networks: 16th China Conference, CWSN 2022, Guangzhou, China, November 10–13, 2022, Proceedings (Communications in Computer and Information Science #1715)
by Huadong Ma Xue Wang Lianglun Cheng Li Cui Liang Liu An ZengThis book constitutes the refereed proceedings of the 16th China Conference on Wireless Sensor Networks, CWSN 2022, which took place in Guangzhou, China, in November 2022. The 17 full papers presented in this volume were carefully reviewed and selected from 204 submissions, including 87 English papers and 117 Chinese papers. The conference provided an academic exchange of research and a development forum for IoT researchers, developers, enterprises, and users. Exchanging results and experience of research and applications in IoT, and discussing the key challenges and research hotspots, is the main goal of the forum. As a high-level forum for the design, implementation, and application of IoT, the conference promoted the exchange and application of the oriesand technologies of IoT-related topics.
Wireless Sensor Networks: From Theory to Applications
by S. Ramakrishnan Ibrahiem M. M. El EmarySupplying comprehensive coverage of WSNs, this book covers the latest advances in WSN technologies. It considers some of theoretical problems in WSN, including issues with monitoring, routing, and power control, and details methodologies that can provide solutions to these problems. It examines applications of WSN across a range of fields, including health, defense military, transportation, and mining. Addressing the main challenges in applying WSNs across all phases of our life, it explains how WSNs can assist in community development.
Wireless Sensor Networks
by Rastko R. Selmic Vir V. Phoha Abdul SerwaddaThis book presents a comprehensive overview of wireless sensor networks (WSNs) with an emphasis on security, coverage, and localization. It offers a structural treatment of WSN building blocks including hardware and protocol architectures and also provides a systems-level view of how WSNs operate. These building blocks will allow readers to program specialized applications and conduct research in advanced topics. A brief introductory chapter covers common applications and communication protocols for WSNs. Next, the authors review basic mathematical models such as Voroni diagrams and Delaunay triangulations. Sensor principles, hardware structure, and medium access protocols are examined. Security challenges ranging from defense strategies to network robustness are explored, along with quality of service measures. Finally, this book discusses recent developments and future directions in WSN platforms. Each chapter concludes with classroom-tested exercises that reinforce key concepts. This book is suitable for researchers and for practitioners in industry. Advanced-level students in electrical engineering and computer science will also find the content helpful as a textbook or reference.
Wireless Sensor Networks: 12th China Conference, Cwsn 2018 Kunming, China, September 21-23, 2018, Revised Selected Papers (Communications in Computer and Information Science #984)
by Shikai Shen Kaiguo Qian Shaojun Yu Wu WangThis book constitutes the refereed proceedings of the 12th China Conference on Wireless Sensor Networks, CWSN 2018, held in Kunming, China, in September 2018. <P><P> The 16 revised full papers were carefully reviewed and selected from 177 submissions. The papers are organized in topical sections on algorithm for wireless sensor network; positioning and location; neural network; energy efficiency and harvesting; privacy and security; image processing.
Wireless Sensor Networks: 18th China Conference, CWSN 2024, Taiyuan, China, September 20–22, 2024, Proceedings, Part II (Communications in Computer and Information Science #2342)
by Limin Sun Yongle ChenThis two-volume set, CCIS 2341 and CCIS 2342, constitutes the refereed proceedings of the 18th China Conference on Wireless Sensor Networks, CWSN 2024, held in Taiyuan, China, during September 20–22, 2024. The 41 full papers presented in this volume were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows:- Part I: Cloud computing and edge computing; Internet of things security and privacy protection; Internet of things service and application technology. Part II: Smart internet of things; Theory and technology of wireless sensor network.
Wireless Sensor Networks: 18th China Conference, CWSN 2024, Taiyuan, China, September 20–22, 2024, Proceedings, Part I (Communications in Computer and Information Science #2341)
by Limin Sun Yongle ChenThis two-volume set, CCIS 2341 and CCIS 2342, constitutes the refereed proceedings of the 18th China Conference on Wireless Sensor Networks, CWSN 2024, held in Taiyuan, China, during September 20–22, 2024. The 41 full papers presented in this volume were carefully reviewed and selected from 75 submissions. They were organized in topical sections as follows:- Part I: Cloud computing and edge computing; Internet of things security and privacy protection; Internet of things service and application technology. Part II: Smart internet of things; Theory and technology of wireless sensor network.
Wireless Sensor Networks: 17th China Conference, CWSN 2023, Dalian, China, October 13–15, 2023, Proceedings (Communications in Computer and Information Science #1994)
by Lei Wang Tie Qiu Chi Lin Xinbing WangThis book constitutes the refereed proceedings of the 17th China Conference on Wireless Sensor Networks, CWSN 2023, which took place in Dalian, China, in October 2023. The 22 full papers presented in this volume were carefully reviewed and selected from 105 submissions, including 38 English papers and 67 Chinese papers. The conference provided an academic exchange of research and a development forum for IoT researchers, developers, enterprises, and users. Exchanging results and experience of research and applications in IoT, and discussing the key challenges and research hotspots, is the main goal of the forum. As a high-level forum for the design, implementation, and application of IoT, the conference promoted the exchange and application of the theories and technologies of IoT-related topics.
Wireless Sensor Networks: 7th China Conference, Cwsn 2013, Qingdao, China, October 17-19, 2013. Revised Selected Papers (Communications In Computer And Information Science #418)
by Xiaofei Wang Zenghua Zhao Limin Sun Li Cui Keqiu Li Huadong Ma Jianzhong LiThis book constitutes the refereed proceedings of the 11th China Conference on Wireless Sensor Networks, CWSN 2017, held in Tianjin, China, in October 2017. The 28 revised full papers were carefully reviewed and selected from 213 submissions. The papers are organized in topical sections on wireless sensor networks; energy efficiency and harvesting; data fusion; mobile computing and social services.
Wireless Sensor Networks
by Shuang-Hua YangWireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: · sensor node design; · embedded software design; · routing algorithms; · sink node positioning; · co-existence with other wireless systems; · data fusion; · security; · indoor location tracking; · integrating with radio-frequency identification; and · Internet of things Wireless Sensor Networks brings together multiple strands of research in the design of WSNs, mainly from software engineering, electronic engineering, and wireless communication perspectives, into an over-arching examination of the subject, benefiting students, field engineers, system developers and IT professionals. The contents have been well used as the teaching material of a course taught at postgraduate level in several universities making it suitable as an advanced text book and a reference book for final-year undergraduate and postgraduate students.
Wireless Sensors in Heterogeneous Networked Systems
by José Cecílio Pedro FurtadoThis book presents an examination of the middleware that can be used to configure and operate heterogeneous node platforms and sensor networks. The middleware requirements for a range of application scenarios are compared and analysed. The text then defines middleware architecture that has been integrated in an approach demonstrated live in a refinery. Features: presents a thorough introduction to the major concepts behind wireless sensor networks (WSNs); reviews the various application scenarios and existing middleware solutions for WSNs; discusses the middleware mechanisms necessary for heterogeneous WSNs; provides a detailed examination of platform-agnostic middleware architecture, including important implementation details; investigates the programming paradigms for WSNs, and for heterogeneous sensor networks in general; describes the results of extensive experimentation and testing, demonstrating that the generic architecture is viable for implementation on multiple platforms.
Wireless Sensors in Industrial Time-Critical Environments
by José Cecílio Pedro FurtadoThis book introduces the fundamentals of DCS, and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics. The text also presents insights and results gained from extensive practical experience in implementing and testing systems within a specific industrial setting. Features: examines the operations that the DCS implements, covering human-machine interfaces, diagnostics and maintenance interfaces, and controllers; discusses industrial control system and wireless network protocols; reviews scheduling in wireless sensor networks; describes a latency model for heterogeneous DCS with wired and wireless parts, that predicts monitoring, command, and closed loop latencies; explains how to plan operation timings systematically; introduces measures and metrics for performance monitoring and debugging, and describes how to add these to a system; presents experimental results to validate the planning approach, based on an application test-bed.
Wireless Technology
by Steven Powell J. P. ShimThis is an edited volume based on selected papers from the annual Wireless Telecommunications Symposium. The WTS is a forum to exchange information on advances in mobile communications and wireless networking technology, management, applications, and security in a conference environment with leaders and experts from industry, governmental agencies, and universities around the world. The key topics from the symposium include: 1) Wireless Network Security, 2) Advances in Satellite Communications, 3) New Wireless Communications Ventures, 4) Wireless Communications Investments, 5) Mobile Wireless Services and Business, 6) Future Directions in Wireless Communications Research. The best papers from the conference were selected, expanded, and edited to produce this cohesive volume.
Wireless Technology, Intelligent Network Technologies, Smart Services and Applications: Proceedings of 4th International Conference on Wireless Communications and Applications (ICWCA 2020) (Smart Innovation, Systems and Technologies #258)
by Lakhmi C. Jain Roumen Kountchev Bin Hu Roumiana KountchevaThis book gathers selected papers presented at the 4th International Conference on Wireless Communications and Applications (ICWCA 2020), held at Hainan University, China. The second volume will involve research works aimed at the contemporary applications: emerging wireless/mobile applications, context and location-aware wireless services; wireless telemedicine and e-health services; intelligent transportation systems; RFID technology and application; cognitive radio and sensor-based applications; content distribution in wireless home environment and many others.
Wireless Technology Prospects and Policy Options
by National Research Council of the National AcademiesThe use of radio-frequency communication--commonly referred to as wireless communication--is becoming more pervasive as well as more economically and socially important. Technological progress over many decades has enabled the deployment of several successive generations of cellular telephone technology, which is now used by many billions of people worldwide; the near-universal addition of wireless local area networking to personal computers; and a proliferation of actual and proposed uses of wireless communications. The flood of new technologies, applications, and markets has also opened up opportunities for examining and adjusting the policy framework that currently governs the management and use of the spectrum and the institutions involved in it, and models for allocating spectrum and charging for it have come under increasing scrutiny. Yet even as many agree that further change to the policy framework is needed, there is debate about precisely how the overall framework should be changed, what trajectory its evolution should follow, and how dramatic or rapid the change should be. Many groups have opinions, positions, demands, and desires related to these questions--reflecting multiple commercial, social, and political agendas and a mix of technical, economic, and social perspectives. The development of technologies and associated policy and regulatory regimes are often closely coupled, an interplay apparent as early as the 1910s, when spectrum policy emerged in response to the growth of radio communications. As outlined in this report, current and ongoing technological advances suggest the need for a careful reassessment of the assumptions that inform spectrum policy in the United States today. This book seeks to shine a spotlight on 21st-century technology trends and to outline the implications of emerging technologies for spectrum management in ways that the committee hopes will be useful to those setting future spectrum policy.
Wireless Vehicular Networks for Car Collision Avoidance
by Rola NajaWireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks.The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.
Wireless Virtualization
by Heming Wen Prabhat Kumar Tiwary Tho Le-NgocThis SpringerBriefs is an overview of the emerging field of wireless access and mobile network virtualization. It provides a clear and relevant picture of the current virtualization trends in wireless technologies by summarizing and comparing different architectures, techniques and technologies applicable to a future virtualized wireless network infrastructure. The readers are exposed to a short walkthrough of the future Internet initiative and network virtualization technologies in order to understand the potential role of wireless virtualization in the broader context of next-generation ubiquitous networks. Three main wireless virtualization perspectives are explored, along with the potential challenges and requirements of a sustainable wireless virtualization framework. Finally, it presents an example of a multi-perspective wireless virtualization framework. The readers learn the latest concepts in the application of wireless virtualization as well as its relationship with cutting-edge wireless technologies such as software-defined radio (SDR) and cognitive radio.
The Wires of War: Technology and the Global Struggle for Power
by Jacob HelbergFrom the former news policy lead at Google, an urgent and groundbreaking account of the high-stakes global cyberwar brewing between Western democracies and the autocracies of China and Russia that could potentially crush democracy.From 2016 to 2020, Jacob Helberg led Google&’s global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a quickly escalating two-front technology cold war between democracy and autocracy. On the front-end, we&’re fighting to control the software—applications, news information, social media platforms, and more—of what we see on the screens of our computers, tablets, and phones, a clash which started out primarily with Russia but now increasingly includes China and Iran. Even more ominously, we&’re also engaged in a hidden back-end battle—largely with China—to control the Internet&’s hardware, which includes devices like cellular phones, satellites, fiber-optic cables, and 5G networks. This tech-fueled war will shape the world&’s balance of power for the coming century as autocracies exploit twenty-first-century methods to re-divide the world into twentieth century-style spheres of influence. Helberg cautions that the spoils of this fight are power over every meaningful aspect of our lives, including our economy, our infrastructure, our national security, and ultimately, our national sovereignty. Without a firm partnership with the government, Silicon Valley is unable to protect democracy from the autocrats looking to sabotage it from Beijing to Moscow and Tehran. The stakes of the ongoing cyberwar are no less than our nation&’s capacity to chart its own future, the freedom of our democratic allies, and even the ability of each of us to control our own fates, Helberg says. And time is quickly running out.
Wireshark 2 Quick Start Guide: Secure your network through protocol analysis
by Charit MishraProtect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies.Key FeaturesLearn protocol analysis, optimization and troubleshooting using Wireshark, an open source toolLearn the usage of filtering and statistical tools to ease your troubleshooting jobQuickly perform root-cause analysis over your network in an event of network failure or a security breachBook DescriptionWireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies.This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations.By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges.What you will learnLearn how TCP/IP works Install Wireshark and understand its GUICreation and Usage of Filters to ease analysis processUnderstand the usual and unusual behaviour of ProtocolsTroubleshoot network anomalies quickly with help of WiresharkUse Wireshark as a diagnostic tool for network security analysis to identify source of malwareDecrypting wireless trafficResolve latencies and bottleneck issues in the networkWho this book is forIf you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed.
Wireshark Essentials
by James H. BaxterThis book is aimed at IT professionals who want to develop or enhance their packet analysis skills. Basic familiarity with common network and application services terms and technologies is assumed; however, expertise in advanced networking topics or protocols is not required. Readers in any IT field can develop the analysis skills specifically needed to complement and support their respective areas of responsibility and interest.
Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals
by Nagendra Kumar Nainar Ashish PandaWith the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn ways to identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. What You'll LearnReview Wireshark analysis and network forensicsStudy traffic capture and its analytics from mobile devicesAnalyze various access technology and cloud trafficWrite your own dissector for any new or proprietary packet formatsCapture secured application traffic for analysisWho This Book Is ForIT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud Operators
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
by Adam Gordon Jessey BullockMaster Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark’s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book’s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: Master the basics of Wireshark Explore the virtual w4sp-lab environment that mimics a real-world network Gain experience using the Debian-based Kali OS among other systems Understand the technical details behind network attacks Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.
Wireshark Fundamentals: A Network Engineer’s Handbook to Analyzing Network Traffic
by Vinit JainUnderstand the fundamentals of the Wireshark tool that is key for network engineers and network security analysts. This book explains how the Wireshark tool can be used to analyze network traffic and teaches you network protocols and features.Author Vinit Jain walks you through the use of Wireshark to analyze network traffic by expanding each section of a header and examining its value. Performing packet capture and analyzing network traffic can be a complex, time-consuming, and tedious task. With the help of this book, you will use the Wireshark tool to its full potential. You will be able to build a strong foundation and know how Layer 2, 3, and 4 traffic behave, how various routing protocols and the Overlay Protocol function, and you will become familiar with their packet structure.Troubleshooting engineers will learn how to analyze traffic and identify issues in the network related to packet loss, bursty traffic, voice quality issues, etc. The book will help you understand the challenges faced in any network environment and how packet capture tools can be used to identify and isolate those issues.This hands-on guide teaches you how to perform various lab tasks. By the end of the book, you will have in-depth knowledge of the Wireshark tool and its features, including filtering and traffic analysis through graphs. You will know how to analyze traffic, find patterns of offending traffic, and secure your network.What You Will LearnUnderstand the architecture of Wireshark on different operating systemsAnalyze Layer 2 and 3 traffic framesAnalyze routing protocol trafficTroubleshoot using Wireshark GraphsWho This Book Is ForNetwork engineers, security specialists, technical support engineers, consultants, and cyber security engineers