Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.14365/3558
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kondakçı, Süleyman | - |
dc.contributor.author | Yilmaz G. | - |
dc.contributor.author | Kocabiyik E. | - |
dc.contributor.author | Coskuner F. | - |
dc.contributor.author | Akçöltekin A. | - |
dc.contributor.author | Yüksel M.S. | - |
dc.date.accessioned | 2023-06-16T15:00:47Z | - |
dc.date.available | 2023-06-16T15:00:47Z | - |
dc.date.issued | 2010 | - |
dc.identifier.isbn | 9.78077E+12 | - |
dc.identifier.uri | https://doi.org/10.1109/ICWMC.2010.103 | - |
dc.identifier.uri | https://hdl.handle.net/20.500.14365/3558 | - |
dc.description | IARIA | en_US |
dc.description | 6th International Conference on Wireless and Mobile Communications, ICWMC 2010 -- 20 September 2010 through 25 September 2010 -- Valencia -- 83967 | en_US |
dc.description.abstract | Real world sensor network deployments and prototype implementations are still a challenging research and development area for scientists and engineers. We present a prototype implementation of a ubiquitous monitoring system (UBIMOS) applying wireless sensor networks. The monitoring system is designed for use by various operation teams, especially by critical rescue and communication teams. With its light weight and secure communication abilities, UBIMOS can be used in a variety of critical operations, ranging from disaster recovery to anti - terror operations. A UBIMOS agent gathers wearable sensor data from individuals, physical locations, and operation team members, and distributes the data to critical decision making and emergency response locations. The distribution of the sensor data is performed in two modes, secure and insecure (but reliable). Therefore, the communication protocol of UBIMOS is implemented to fully support secure node-authentications and secure data exchange operations, as well as insecure but fast data exchange operations. © 2010 IEEE. | en_US |
dc.language.iso | en | en_US |
dc.relation.ispartof | Proceedings - 6th International Conference on Wireless and Mobile Communications, ICWMC 2010 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Security protocol | en_US |
dc.subject | Ubiquitous system | en_US |
dc.subject | WSN application | en_US |
dc.subject | Anti-terror operations | en_US |
dc.subject | Communication protocols | en_US |
dc.subject | Critical operations | en_US |
dc.subject | Data exchange | en_US |
dc.subject | Disaster recovery | en_US |
dc.subject | Emergency response | en_US |
dc.subject | Light weight | en_US |
dc.subject | Monitoring system | en_US |
dc.subject | Network deployment | en_US |
dc.subject | Physical locations | en_US |
dc.subject | Prototype implementations | en_US |
dc.subject | Rescue operations | en_US |
dc.subject | Research and development | en_US |
dc.subject | Scientists and engineers | en_US |
dc.subject | Secure communications | en_US |
dc.subject | Secure data | en_US |
dc.subject | Security protocol | en_US |
dc.subject | Sensor data | en_US |
dc.subject | Team members | en_US |
dc.subject | Ubiquitous systems | en_US |
dc.subject | Wearable sensors | en_US |
dc.subject | WSN application | en_US |
dc.subject | Communication | en_US |
dc.subject | Cryptography | en_US |
dc.subject | Decision making | en_US |
dc.subject | Mobile telecommunication systems | en_US |
dc.subject | Monitoring | en_US |
dc.subject | Sensors | en_US |
dc.subject | Wireless sensor networks | en_US |
dc.title | Ubiquitous monitoring system for critical rescue operations | en_US |
dc.type | Conference Object | en_US |
dc.identifier.doi | 10.1109/ICWMC.2010.103 | - |
dc.identifier.scopus | 2-s2.0-79952056314 | en_US |
dc.authorscopusid | 15061511300 | - |
dc.authorscopusid | 57204231850 | - |
dc.authorscopusid | 36997125000 | - |
dc.authorscopusid | 36997021300 | - |
dc.authorscopusid | 57197111793 | - |
dc.identifier.startpage | 515 | en_US |
dc.identifier.endpage | 520 | en_US |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.identifier.scopusquality | N/A | - |
dc.identifier.wosquality | N/A | - |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.grantfulltext | reserved | - |
item.fulltext | With Fulltext | - |
item.languageiso639-1 | en | - |
item.openairetype | Conference Object | - |
crisitem.author.dept | 05.05. Computer Engineering | - |
Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Files in This Item:
File | Size | Format | |
---|---|---|---|
2648.pdf Restricted Access | 215.6 kB | Adobe PDF | View/Open Request a copy |
CORE Recommender
SCOPUSTM
Citations
2
checked on Nov 20, 2024
Page view(s)
70
checked on Nov 18, 2024
Download(s)
6
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.