H.N. Nguyen, R. Palaniappan, N. Aydin, S. Jin, and D. Turgut. Intrusion detection in wireless sensor networks. In Proceedings of International Conference of Security and Management (SAM'07), pp. 10–16, 2007.
(unavailable)
There are several applications that use sensor motes and researchers continue to explore additional applications. For the intruder detection application, we use a set of Berkley mica2 motes on TinyOS operating system. Different types of sensors such as pressure, light, and so on can be used to identify the presence of an intruder in the field. In our case, we choose light sensors for the detection. When an intruder crosses the monitored environment, the system detects the changes on the light values. Any change greater than a predefined threshold indicates the pres- ence of an intruder. An integrated webcam is used to take snapshot of the intruder and transmit the pictures through the network to a remote station. The basic motivation of this paper is that a sensor-based web system can be used to detect any intruder in a specific area from a remote location.
@inproceedings{Hong-2007-SAM, author = "H.N. Nguyen and R. Palaniappan and N. Aydin and S. Jin and D. Turgut", title = "Intrusion detection in wireless sensor networks", booktitle = "Proceedings of International Conference of Security and Management (SAM'07)", pages = "10-16", year = "2007", abstract = { There are several applications that use sensor motes and researchers continue to explore additional applications. For the intruder detection application, we use a set of Berkley mica2 motes on TinyOS operating system. Different types of sensors such as pressure, light, and so on can be used to identify the presence of an intruder in the field. In our case, we choose light sensors for the detection. When an intruder crosses the monitored environment, the system detects the changes on the light values. Any change greater than a predefined threshold indicates the pres- ence of an intruder. An integrated webcam is used to take snapshot of the intruder and transmit the pictures through the network to a remote station. The basic motivation of this paper is that a sensor-based web system can be used to detect any intruder in a specific area from a remote location. }, }
Generated by bib2html.pl (written by Patrick Riley, Lotzi Boloni ) on Sun Mar 03, 2024 18:41:15