TY - MANSCPT AU - Elhoseny, Mohamed AU - Hassanien, Aboul Ella TI - Dynamic wireless sensor networks. New directions for smart technologies SN - 9783319928067 U1 - 621.382 PY - 2019/// CY - Texas (Estados Unidos): PB - Springer International Publishing, KW - COMUNICACIONES DIGITALES KW - ANTENAS KW - TELECOMUNICACIONES KW - PROGRAMACION N1 - Incluye índice, figuras; Part I. WSN for complex and mobile-based applications. 1. Mobile object tracking in wide environments using WSNs.-- Related work.-- The problem formulation and the propased solution.-- Experimental results and discussion.-- Summary.-- 2. Expand mobile WSN coverage in harsh environments.-- Related work.-- Heterogeneous WSN clustering using genetic algorithm.-- Results and discussion. 3. Hierarchical and clustering WSN models: their requirements for complex applications.-- WSN concepts and terminologies.-- Wireless sensor network challenges.-- Routing models.-- WSN application areas.-- Homogeneous and heterogeneous WSN. 4. Extending homogeneous WSN lifetime in dynamic environments using the clustering model.-- Hypothesis and objectives.-- Network model and energy estimation.-- Energy and spatial factors for longevity.-- Dynamically structuring sensor network using GA.-- Genetic algorithm-based, self-organizing network.-- Results. 5. Optimizing cluster head selection in WSN to prolong its existence.-- WSN construction.-- The proposed GA clustering Method.-- Cluster head for multi-hope clustering model.-- Experiemental results and discussion. Part II. WSN for secure data processing and live data aggregation.-- 6. Secure data transmission in WSN: an overview.-- Overview.-- The working steps for building GASONeC protocol.-- Security problems of wireless sensor network.-- Secure clustering evaluation criteria.-- The existing schemes for secure clustering in WSN.-- Secure clustering alforithms.-- Secure clustering algorithms analysis and evaluation. 7. An encryption model for data processing in WSN.-- Objectives and contributions.-- Related work.-- The proposed secure clustering schema.-- Experimental results and discussion. 8. Using a wireless sensor to acquire live data on a SCADA system, toward monitoring file integrity.-- Reseach objectives.-- Background information.-- The proposed model.-- The proposed models architecture and framework.-- The working steps towards implement the proposed method.-- Conclusion ER -