In Wireless Sensor Networks, nodes are deployed randomly throughout the network and these nodes work without human intervention. Sensor devices can be moni- tored remotely by authorized persons only but sometimes hackers attack to destroy or steal data from the network. Sensor nodes are connected in such a way that they can broadcast data in the network according to the routing algorithm in an appropri- ate manner. WSN itself has many limitations such as sensor devices present in the network having less storage capacity and low battery backup. Security and power constraints are the main concerns in wireless sensor networks. Sensor nodes can be deployed in inaccessible areas to study its various factors. WSNs are widely used systems throughout the world nowadays. For instance, no- table WSN applications are military, healthcare, environmental, traffic control, ed- ucation, and home care. In healthcare, nodes are deployed on the body of the patient so that a doctor can monitor and diagnose the illness. The defense forces utilize sen- sor devices to control and monitor the suspected activities in the territory. In WSNs, data nodes themselves are the routers where transmission is done in multi-hops to reach the data packet to its final destination and these sensor nodes carry vulnerable data that can be attacked and destroyed by the wrongdoers. Data transmitted by the sensor nodes is all in the air and prone to attacks. Furthermore, sensor nodes can fail at any point of transmission in the network because of their low energy constraint.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 50085091
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
Etat : New. N° de réf. du vendeur 50085091-n
Quantité disponible : Plus de 20 disponibles
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
PAP. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L0-9798230156567
Quantité disponible : Plus de 20 disponibles
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
PAP. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L0-9798230156567
Quantité disponible : Plus de 20 disponibles
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
Etat : New. In. N° de réf. du vendeur ria9798230156567_new
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : New. N° de réf. du vendeur 50085091-n
Quantité disponible : Plus de 20 disponibles
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
Etat : As New. Unread book in perfect condition. N° de réf. du vendeur 50085091
Quantité disponible : Plus de 20 disponibles
Vendeur : preigu, Osnabrück, Allemagne
Taschenbuch. Etat : Neu. A Decentralized Technology Model Incorporating Reinforcement Learning for Protected and Energy-Conserving Infrastructures | Custos Veritatis Leo | Taschenbuch | Englisch | 2025 | Hussaini Begum | EAN 9798230156567 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand. N° de réf. du vendeur 132455693
Quantité disponible : 5 disponible(s)