Data requirements from evolvable sensor networks for homeland security problems

被引:0
|
作者
Haupt, Sue Ellen [1 ]
Long, Kerrie J. [1 ]
Young, George S. [2 ]
Beyer, Anke [2 ]
机构
[1] Penn State Univ, Appl Res Lab, University Pk, PA 16802 USA
[2] Penn State Univ, Meteorol Dept, University Pk, PA 16802 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the event of a release of toxic contaminant, either accidental or intentional, it would be useful to have an evolvable sensor network for tracking the toxic plume. In such an event, Homeland Security or DoD personnel are responsible for modeling the transport and dispersion of the plume. To do this requires specific source and meteorological data. Such data may not be available; however, it might be recoverable from concentration data monitored by a mobile sensor network. To be useful for assimilating the monitored data into a dispersion model, the sensor network must be sited strategically and should be evolvable to follow the plume of toxic contaminant. This paper discusses the requirements of such a network from the point of view of data needs for assimilating the sensor data into the transport and dispersion models.
引用
收藏
页码:58 / +
页数:2
相关论文
共 50 条
  • [31] Security in Sensor Networks
    Fischer, Stefan
    Zitterbart, Martina
    IT-INFORMATION TECHNOLOGY, 2010, 52 (06): : 311 - 312
  • [32] Security in cognitive wireless sensor networks. Challenges and open problems
    Alvaro Araujo
    Javier Blesa
    Elena Romero
    Daniel Villanueva
    EURASIP Journal on Wireless Communications and Networking, 2012
  • [33] Security in cognitive wireless sensor networks. Challenges and open problems
    Araujo, Alvaro
    Blesa, Javier
    Romero, Elena
    Villanueva, Daniel
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012, : 1 - 8
  • [34] A Study of the Security Problems of Wireless Sensor Networks into the Context of the Internet of Things
    Mostefa, Benfilali
    Abdelkader, Gafour
    ISCSIC'18: PROCEEDINGS OF THE 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROL, 2018,
  • [35] Data Security in Wireless Sensor Networks via AES Algorithm
    Panda, Madhumita
    PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
  • [36] A Security Data Forwarding Mechanism for Sparse Social Sensor Networks
    Guan, Xin
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [37] Data Collection for Security Measurement in Wireless Sensor Networks: A Survey
    Xie, Haomeng
    Yan, Zheng
    Yao, Zhen
    Atiquzzaman, Mohammed
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) : 2205 - 2224
  • [38] Research on Data Transmission Security Technology of Wireless Sensor Networks
    Zhang, Jinsong
    Zhang, Hua
    INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2016, 9 (12): : 351 - 360
  • [39] Data security in unattended wireless sensor networks with mobile sinks
    Liu, Zhihong
    Ma, Jianfeng
    Park, Youngho
    Xiang, Shangrong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2012, 12 (13): : 1131 - 1146
  • [40] Data Aggregation Security Challenge in Wireless Sensor Networks: A Survey
    Labraoui, Nabila
    Guerroui, Mourad
    Aliouat, Makhlouf
    Zia, Tanveer
    AD HOC & SENSOR WIRELESS NETWORKS, 2011, 12 (3-4) : 295 - 324