• DocumentCode
    2496107
  • Title

    The Analysis for the Attack on the Wireless Bridge Monitoring System

  • Author

    Liu, Chung-Hsin ; Teng, Po-Cheng

  • Author_Institution
    Dept. of Comput. Sci., Chinese Culture Univ., Taipei, Taiwan
  • Volume
    2
  • fYear
    2010
  • fDate
    24-25 April 2010
  • Firstpage
    96
  • Lastpage
    99
  • Abstract
    Wireless sensor network technology, through a large number of sensors to collect environmental factors, and then return the information through a wireless network to the back-end server-based computing. Bridge Monitoring in the field of civil engineering bridge which is used to observe whether the damage to the most effective way, at this stage mainly manpower to the scene to set the main instrument observations. In this study into wireless sensor system through the wireless sensors, effectively reduce the labor costs, and through the camera in a situation of start, with 3G mobile phone system return message to the monitoring personnel files. In this study, NS2 simulation experiment to simulate a wireless sensor network file if the transfer to the gateway node. Finally because the remote areas, the node may be due to denial of service attacks suffered external damage or the node for the node after the detour of damage with the attack used by the different queue management model, to simulate the queue with the analysis of the various attack packet loss under normal circumstances.
  • Keywords
    computerised monitoring; structural engineering computing; wireless sensor networks; 3G mobile phone system; NS2 simulation; back-end server-based computing; civil engineering bridge; gateway node; queue management model; service attacks; wireless bridge monitoring system; wireless sensor network technology; Bridges; Civil engineering; Computer networks; Environmental factors; Instruments; Layout; Monitoring; Queueing analysis; Sensor systems; Wireless sensor networks;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Multimedia and Information Technology (MMIT), 2010 Second International Conference on
  • Conference_Location
    Kaifeng
  • Print_ISBN
    978-0-7695-4008-5
  • Electronic_ISBN
    978-1-4244-6602-3
  • Type

    conf

  • DOI
    10.1109/MMIT.2010.154
  • Filename
    5474333