\r\n\t• Role of technological innovation and corporate risk management \r\n\t• Challenges for corporate governance while launching corporate environmental management among emerging economies \r\n\t• Demonstrating the relationship between environmental risk management and sustainable management \r\n\t• Contemplating strategic corporate environmental responsibility under the influence of cultural barriers \r\n\t• Risk management in different countries – the international management dimension \r\n\t• Global Standardization vs local adaptation of corporate environmental risk management in multinational corporations. \r\n\t• Is there a transnational approach to environmental risk management? \r\n\t• Approaches towards Risk management strategies in the short-term and long-term.
",isbn:"978-1-83968-906-2",printIsbn:"978-1-83968-905-5",pdfIsbn:"978-1-83968-907-9",doi:null,price:0,priceEur:0,priceUsd:0,slug:null,numberOfPages:0,isOpenForSubmission:!1,hash:"9b65afaff43ec930bc6ee52c4aa1f78f",bookSignature:"Dr. Muddassar Sarfraz and Prof. Larisa Ivascu",publishedDate:null,coverURL:"https://cdn.intechopen.com/books/images_new/10226.jpg",keywords:"Global Risk Management, Risk Assessment, Climate Risk, Environmental Management, International Business, Business Sustainability, Corporate Governance, Financial Market, Financial Risks, Sustainable Economic Environment, Business Valuation, Organizational Behavior",numberOfDownloads:102,numberOfWosCitations:0,numberOfCrossrefCitations:0,numberOfDimensionsCitations:0,numberOfTotalCitations:0,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"September 24th 2020",dateEndSecondStepPublish:"October 22nd 2020",dateEndThirdStepPublish:"December 21st 2020",dateEndFourthStepPublish:"March 11th 2021",dateEndFifthStepPublish:"May 10th 2021",remainingDaysToSecondStep:"4 months",secondStepPassed:!0,currentStepOfPublishingProcess:4,editedByType:null,kuFlag:!1,biosketch:"Dr. Muddassar Sarfraz focuses on corporate social responsibility, human resource management, strategic management, and business management. He is a member of the British Academy of Management (UK), Chinese Economists Society (USA), World Economic Association (UK), American Economic Association (USA), and an Ambassador of the International MBA program of Chongqing University, PR China, for Pakistan.",coeditorOneBiosketch:"Dr. Larisa Ivascu's area of research includes sustainability, management, and strategic management. She has published over 190 papers in international journals. She is vice-president of the Society for Ergonomics and Work Environment Management, Timisoara, and a member of the World Economics Association (WEA), International Economics Development and Research Center (IEDRC), Engineering, and Management Research Center (CCIM).",coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"260655",title:"Dr.",name:"Muddassar",middleName:null,surname:"Sarfraz",slug:"muddassar-sarfraz",fullName:"Muddassar Sarfraz",profilePictureURL:"https://mts.intechopen.com/storage/users/260655/images/system/260655.jpeg",biography:"Dr Muddassar Sarfraz is working at the Binjiang College, Nanjing University of Information Science and Technology, Wuxi, Jiangsu, China. He has obtained his PhD in Management Sciences and Engineering from the Business School of Hohai University. He holds an International Master of Business Administration (IMBA) from Chongqing University (China) and Master of Business Administration (HR) from The University of Lahore. He has published tens of papers in foreign authoritative journals and academic conferences both at home and abroad.\nHe is the Book Editor of Sustainable Management Practices, Analyzing the Relationship between Corporate Governance, CSR, Sustainability, and Cogitating the Interconnection between Corporate Social Responsibility and Sustainability. He is the Associate and Guest Editor of Frontiers in Psychology, International Journal of Humanities and Social Development Research and the Journal of Science and Innovative Technologies. He is an Editorial Board Member of the International Journal of Human Resource as well as a member of the British Academy of Management (UK), Chinese Economists Society (USA), World Economic Association (UK), American Economic Association (USA), and an Ambassador of the International MBA program of Chongqing University, PR China, for Pakistan. \nHis research focuses on corporate social responsibility, human resource management, strategic management, and business management.",institutionString:"Binjiang College, Nanjing University of Information Science &Technology, Wuxi, Jiangsu",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"0",totalChapterViews:"0",totalEditedBooks:"1",institution:null}],coeditorOne:{id:"288698",title:"Prof.",name:"Larisa",middleName:null,surname:"Ivascu",slug:"larisa-ivascu",fullName:"Larisa Ivascu",profilePictureURL:"https://s3.us-east-1.amazonaws.com/intech-files/0030O00002bRfMOQA0/Profile_Picture_1594716735521",biography:"Dr Larisa IVAȘCU is currently an associate professor at the Politehnica University of Timisoara. Her area of research includes sustainability, management, and strategic management. She has published over 190 papers in international journals in which 86 are Clarivate Analytics indexed, and 102 as first or sole author, and participated in many international conferences as an Invited Speaker. She is vice-president of the Society for Ergonomics and Work Environment Management, Timisoara, and a member of World Economics Association (WEA), International Economics Development and Research Center (IEDRC), Engineering and Management Research Center (CCIM), and Member of Academic Management Society of Romania (SAMRO, http://samro.ro/).",institutionString:"Politehnica University of Timisoara",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"0",totalChapterViews:"0",totalEditedBooks:"0",institution:null},coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"7",title:"Business, Management and Economics",slug:"business-management-and-economics"}],chapters:[{id:"75308",title:"Insurance Business and Sustainable Development",slug:"insurance-business-and-sustainable-development",totalDownloads:3,totalCrossrefCites:0,authors:[null]},{id:"74554",title:"Fuzzy Approach Model to Portfolio Risk Response Strategies",slug:"fuzzy-approach-model-to-portfolio-risk-response-strategies",totalDownloads:99,totalCrossrefCites:0,authors:[null]}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"184402",firstName:"Romina",lastName:"Rovan",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/184402/images/4747_n.jpg",email:"romina.r@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"9337",title:"Sustainable Management Practices",subtitle:null,isOpenForSubmission:!1,hash:"ef070ee744c15a1084cca5bb546816df",slug:"sustainable-management-practices",bookSignature:"Muddassar Sarfraz, Muhammad Ibrahim Adbullah, Abdul Rauf and Syed Ghulam Meran Shah",coverURL:"https://cdn.intechopen.com/books/images_new/9337.jpg",editedByType:"Edited by",editors:[{id:"260655",title:"Dr.",name:"Muddassar",surname:"Sarfraz",slug:"muddassar-sarfraz",fullName:"Muddassar Sarfraz"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"878",title:"Phytochemicals",subtitle:"A Global Perspective of Their Role in Nutrition and Health",isOpenForSubmission:!1,hash:"ec77671f63975ef2d16192897deb6835",slug:"phytochemicals-a-global-perspective-of-their-role-in-nutrition-and-health",bookSignature:"Venketeshwer Rao",coverURL:"https://cdn.intechopen.com/books/images_new/878.jpg",editedByType:"Edited by",editors:[{id:"82663",title:"Dr.",name:"Venketeshwer",surname:"Rao",slug:"venketeshwer-rao",fullName:"Venketeshwer Rao"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"4816",title:"Face Recognition",subtitle:null,isOpenForSubmission:!1,hash:"146063b5359146b7718ea86bad47c8eb",slug:"face_recognition",bookSignature:"Kresimir Delac and Mislav Grgic",coverURL:"https://cdn.intechopen.com/books/images_new/4816.jpg",editedByType:"Edited by",editors:[{id:"528",title:"Dr.",name:"Kresimir",surname:"Delac",slug:"kresimir-delac",fullName:"Kresimir Delac"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"17631",title:"Remote Instrumentation Laboratory for Digital Signal Processors Training",doi:"10.5772/23742",slug:"remote-instrumentation-laboratory-for-digital-signal-processors-training",body:null,keywords:null,chapterPDFUrl:"https://cdn.intechopen.com/pdfs/17631.pdf",chapterXML:null,downloadPdfUrl:"/chapter/pdf-download/17631",previewPdfUrl:"/chapter/pdf-preview/17631",totalDownloads:4206,totalViews:116,totalCrossrefCites:0,totalDimensionsCites:0,hasAltmetrics:0,dateSubmitted:"November 29th 2010",dateReviewed:"April 19th 2011",datePrePublished:null,datePublished:"August 1st 2011",dateFinished:null,readingETA:"0",abstract:null,reviewType:"peer-reviewed",bibtexUrl:"/chapter/bibtex/17631",risUrl:"/chapter/ris/17631",book:{slug:"practical-applications-and-solutions-using-labview-software"},signatures:"Sergio Gallardo, Federico J. Barrero and Sergio L. Toral",authors:[{id:"11658",title:"Dr.",name:"Sergio",middleName:null,surname:"Toral",fullName:"Sergio Toral",slug:"sergio-toral",email:"toral@esi.us.es",position:null,institution:null},{id:"11659",title:"Dr.",name:"Federico",middleName:null,surname:"Barrero",fullName:"Federico Barrero",slug:"federico-barrero",email:"fbarrero@esi.us.es",position:null,institution:null},{id:"53514",title:"MSc",name:"Sergio",middleName:null,surname:"Gallardo",fullName:"Sergio Gallardo",slug:"sergio-gallardo",email:"sergio.gallardo@murciaeduca.es",position:null,institution:null}],sections:null,chapterReferences:null,footnotes:null,contributors:null,corrections:null},book:{id:"293",title:"Practical Applications and Solutions Using LabVIEW™ Software",subtitle:null,fullTitle:"Practical Applications and Solutions Using LabVIEW™ Software",slug:"practical-applications-and-solutions-using-labview-software",publishedDate:"August 1st 2011",bookSignature:"Folea Silviu",coverURL:"https://cdn.intechopen.com/books/images_new/293.jpg",licenceType:"CC BY-NC-SA 3.0",editedByType:"Edited by",editors:[{id:"6084",title:"Prof.",name:"Silviu",middleName:null,surname:"Folea",slug:"silviu-folea",fullName:"Silviu Folea"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"17619",title:"Virtual Instrument for Online Electrical Capacitance Tomography",slug:"virtual-instrument-for-online-electrical-capacitance-tomography",totalDownloads:3069,totalCrossrefCites:0,signatures:"Zhaoyan Fan, Robert X. Gao and Jinjiang Wang",authors:[{id:"35218",title:"Prof.",name:"Robert",middleName:"X",surname:"Gao",fullName:"Robert Gao",slug:"robert-gao"},{id:"61001",title:"MSc",name:"Jinjiang",middleName:null,surname:"Wang",fullName:"Jinjiang Wang",slug:"jinjiang-wang"},{id:"61002",title:"Dr.",name:"Zhaoyan",middleName:null,surname:"Fan",fullName:"Zhaoyan Fan",slug:"zhaoyan-fan"}]},{id:"17620",title:"Low-Field NMR/MRI Systems Using LabVIEW and Advanced Data-Acquisition Techniques",slug:"low-field-nmr-mri-systems-using-labview-and-advanced-data-acquisition-techniques",totalDownloads:5533,totalCrossrefCites:1,signatures:"Aktham Asfour",authors:[{id:"36070",title:"Dr.",name:"Aktham",middleName:null,surname:"Asfour",fullName:"Aktham Asfour",slug:"aktham-asfour"}]},{id:"17621",title:"DH V 2.0, A Pocket PC Software to Evaluate Drip Irrigation Lateral Diameters Fed from the Extreme with on-line Emitters in Slope Surfaces",slug:"dh-v-2-0-a-pocket-pc-software-to-evaluate-drip-irrigation-lateral-diameters-fed-from-the-extreme-wit",totalDownloads:2852,totalCrossrefCites:0,signatures:"José Miguel Molina-Martínez, Manuel Jiménez-Buendía and Antonio Ruiz-Canales",authors:[null]},{id:"17622",title:"Application of Virtual Instrumentation in Nuclear Physics Experiments",slug:"application-of-virtual-instrumentation-in-nuclear-physics-experiments",totalDownloads:4767,totalCrossrefCites:1,signatures:"Jiri Pechousek",authors:[{id:"35230",title:"Dr.",name:"Jiri",middleName:null,surname:"Pechousek",fullName:"Jiri Pechousek",slug:"jiri-pechousek"}]},{id:"17623",title:"Real-Time Rapid Embedded Power System Control Prototyping Simulation Test-Bed Using LabVIEW and RTDS",slug:"real-time-rapid-embedded-power-system-control-prototyping-simulation-test-bed-using-labview-and-rtds",totalDownloads:5601,totalCrossrefCites:3,signatures:"Karen Butler-Purry and Hung-Ming Chou",authors:[{id:"56336",title:"Dr.",name:"Karen",middleName:null,surname:"Butler-Purry",fullName:"Karen Butler-Purry",slug:"karen-butler-purry"},{id:"56342",title:"Mr.",name:"Hong-Ming",middleName:null,surname:"Chou",fullName:"Hong-Ming Chou",slug:"hong-ming-chou"}]},{id:"17624",title:"The Development of a Hardware-in-the-Loop Simulation System for Unmanned Aerial Vehicle Autopilot Design Using LabVIEW",slug:"the-development-of-a-hardware-in-the-loop-simulation-system-for-unmanned-aerial-vehicle-autopilot-de",totalDownloads:4939,totalCrossrefCites:0,signatures:"Yun-Ping Sun",authors:[{id:"51363",title:"Prof.",name:"Yun-Ping",middleName:null,surname:"Sun",fullName:"Yun-Ping Sun",slug:"yun-ping-sun"}]},{id:"17625",title:"Equipment Based on the Hardware in the Loop (HIL) Concept to Test Automation Equipment Using Plant Simulation",slug:"equipment-based-on-the-hardware-in-the-loop-hil-concept-to-test-automation-equipment-using-plant-sim",totalDownloads:2666,totalCrossrefCites:1,signatures:"Eduardo Moreira, Rodrigo Pantoni and Dennis Brandão",authors:[{id:"39790",title:"Prof.",name:"Dennis",middleName:null,surname:"Brandão",fullName:"Dennis Brandão",slug:"dennis-brandao"},{id:"54127",title:"Dr.",name:null,middleName:null,surname:"Pantoni",fullName:"Pantoni",slug:"pantoni"},{id:"55254",title:"Mr.",name:"Eduardo",middleName:null,surname:"Moreira",fullName:"Eduardo Moreira",slug:"eduardo-moreira"}]},{id:"17626",title:"Sophisticated Biomedical Tissue Measurement Using Image Analysis and Virtual Instrumentation",slug:"sophisticated-biomedical-tissue-measurement-using-image-analysis-and-virtual-instrumentation",totalDownloads:2546,totalCrossrefCites:7,signatures:"Libor Hargaš, Dušan Koniar and Stanislav Štofan",authors:[{id:"45005",title:"Dr.",name:"Libor",middleName:null,surname:"Hargaš",fullName:"Libor Hargaš",slug:"libor-hargas"},{id:"45098",title:"Dr.",name:"Dusan",middleName:null,surname:"Koniar",fullName:"Dusan Koniar",slug:"dusan-koniar"},{id:"45099",title:"MSc.",name:"Stanislav",middleName:null,surname:"Stofan",fullName:"Stanislav Stofan",slug:"stanislav-stofan"}]},{id:"17627",title:"Instrument Design, Measurement and Analysis of Cardiovascular Dynamics Based on LabVIEW",slug:"instrument-design-measurement-and-analysis-of-cardiovascular-dynamics-based-on-labview",totalDownloads:3491,totalCrossrefCites:0,signatures:"Wei He, Hanguang Xiao, Songnong Li and Delmo Correia",authors:[{id:"48674",title:"Dr.",name:"Hanguang",middleName:null,surname:"Xiao",fullName:"Hanguang Xiao",slug:"hanguang-xiao"},{id:"50605",title:"Prof.",name:"Wei",middleName:null,surname:"He",fullName:"Wei He",slug:"wei-he"},{id:"50606",title:"Dr.",name:"Songnong",middleName:null,surname:"Li",fullName:"Songnong Li",slug:"songnong-li"}]},{id:"17628",title:"ECG Ambulatory System for Long Term Monitoring of Heart Rate Dynamics",slug:"ecg-ambulatory-system-for-long-term-monitoring-of-heart-rate-dynamics",totalDownloads:4154,totalCrossrefCites:1,signatures:"Agustín Márquez-Espinoza, José G. Mercado-Rojas, Gabriel Vega-Martínez and Carlos Alvarado-Serrano",authors:[{id:"41163",title:"Dr.",name:"Carlos",middleName:null,surname:"Alvarado-Serrano",fullName:"Carlos Alvarado-Serrano",slug:"carlos-alvarado-serrano"},{id:"41184",title:"MSc",name:"Agustín",middleName:null,surname:"Márquez-Espinoza",fullName:"Agustín Márquez-Espinoza",slug:"agustin-marquez-espinoza"},{id:"49566",title:"Dr.",name:"José G.",middleName:null,surname:"Mercado-Rojas",fullName:"José G. Mercado-Rojas",slug:"jose-g.-mercado-rojas"},{id:"74922",title:"MSc.",name:"Gabriel",middleName:null,surname:"Vega-Martínez",fullName:"Gabriel Vega-Martínez",slug:"gabriel-vega-martinez"}]},{id:"17629",title:"Acoustical Measurement and Fan Fault Diagnosis System Based on LabVIEW",slug:"acoustical-measurement-and-fan-fault-diagnosis-system-based-on-labview",totalDownloads:3775,totalCrossrefCites:0,signatures:"Guangzhong Cao",authors:[{id:"46808",title:"Prof.",name:"Guangzhong",middleName:null,surname:"Cao",fullName:"Guangzhong Cao",slug:"guangzhong-cao"}]},{id:"17630",title:"Condition Monitoring of Zinc Oxide Surge Arresters",slug:"condition-monitoring-of-zinc-oxide-surge-arresters",totalDownloads:9572,totalCrossrefCites:2,signatures:"Novizon, Zulkurnain Abdul-Malek, Nouruddeen Bashir and Aulia",authors:[{id:"28079",title:"Dr.",name:"Nouruddeen",middleName:null,surname:"Bashir",fullName:"Nouruddeen Bashir",slug:"nouruddeen-bashir"},{id:"53606",title:"Dr.",name:"Zulkurnain",middleName:null,surname:"Abdul-Malek",fullName:"Zulkurnain Abdul-Malek",slug:"zulkurnain-abdul-malek"},{id:"53607",title:"Dr.",name:"Yusuf",middleName:null,surname:"Novizon",fullName:"Yusuf Novizon",slug:"yusuf-novizon"},{id:"54553",title:"Dr.",name:"Aulia",middleName:null,surname:"-",fullName:"Aulia -",slug:"aulia-"}]},{id:"17631",title:"Remote Instrumentation Laboratory for Digital Signal Processors Training",slug:"remote-instrumentation-laboratory-for-digital-signal-processors-training",totalDownloads:4206,totalCrossrefCites:0,signatures:"Sergio Gallardo, Federico J. Barrero and Sergio L. Toral",authors:[{id:"11658",title:"Dr.",name:"Sergio",middleName:null,surname:"Toral",fullName:"Sergio Toral",slug:"sergio-toral"},{id:"11659",title:"Dr.",name:"Federico",middleName:null,surname:"Barrero",fullName:"Federico Barrero",slug:"federico-barrero"},{id:"53514",title:"MSc",name:"Sergio",middleName:null,surname:"Gallardo",fullName:"Sergio Gallardo",slug:"sergio-gallardo"}]},{id:"17632",title:"Digital Image Processing Using LabView",slug:"digital-image-processing-using-labview",totalDownloads:35358,totalCrossrefCites:5,signatures:"Rubén Posada-Gómez, Oscar Osvaldo Sandoval-González, Albino Martínez Sibaja, Otniel Portillo-Rodríguez and Giner Alor-Hernández",authors:[{id:"5221",title:"Dr.",name:"Otniel",middleName:null,surname:"Portillo Rodriguez",fullName:"Otniel Portillo Rodriguez",slug:"otniel-portillo-rodriguez"},{id:"43166",title:"Dr.",name:"Giner",middleName:null,surname:"Alor-Hernandez",fullName:"Giner Alor-Hernandez",slug:"giner-alor-hernandez"},{id:"51427",title:"Dr.",name:"Rubén",middleName:null,surname:"Posada-Gómez",fullName:"Rubén Posada-Gómez",slug:"ruben-posada-gomez"},{id:"55447",title:"PhD.",name:"Oscar",middleName:"Osvaldo",surname:"Sandoval-Gonzalez",fullName:"Oscar Sandoval-Gonzalez",slug:"oscar-sandoval-gonzalez"},{id:"90369",title:"Dr.",name:"Albino",middleName:null,surname:"Martínez-Sibaja",fullName:"Albino Martínez-Sibaja",slug:"albino-martinez-sibaja"}]},{id:"17633",title:"Remote SMS Instrumentation Supervision and Control Using LabVIEW",slug:"remote-sms-instrumentation-supervision-and-control-using-labview",totalDownloads:8132,totalCrossrefCites:0,signatures:"Rafael C. Figueiredo, Antonio M. O. Ribeiro, Rangel Arthur and Evandro Conforti",authors:[{id:"48096",title:"Ph.D.",name:"Rafael",middleName:"C.",surname:"Figueiredo",fullName:"Rafael Figueiredo",slug:"rafael-figueiredo"},{id:"51067",title:"Prof.",name:"Evandro",middleName:null,surname:"Conforti",fullName:"Evandro Conforti",slug:"evandro-conforti"},{id:"83776",title:"MSc.",name:"Antonio Marcelo",middleName:null,surname:"O. Ribeiro",fullName:"Antonio Marcelo O. Ribeiro",slug:"antonio-marcelo-o.-ribeiro"},{id:"83777",title:"Prof.",name:"Rangel",middleName:null,surname:"Arthur",fullName:"Rangel Arthur",slug:"rangel-arthur"}]},{id:"17634",title:"Lightning Location and Mapping System Using Time Difference of Arrival (TDoA) Technique",slug:"lightning-location-and-mapping-system-using-time-difference-of-arrival-tdoa-technique",totalDownloads:3235,totalCrossrefCites:1,signatures:"Zulkurnain Abdul-Malek, Aulia, Nouruddeen Bashir and Novizon",authors:[{id:"28079",title:"Dr.",name:"Nouruddeen",middleName:null,surname:"Bashir",fullName:"Nouruddeen Bashir",slug:"nouruddeen-bashir"},{id:"53606",title:"Dr.",name:"Zulkurnain",middleName:null,surname:"Abdul-Malek",fullName:"Zulkurnain Abdul-Malek",slug:"zulkurnain-abdul-malek"},{id:"54553",title:"Dr.",name:"Aulia",middleName:null,surname:"-",fullName:"Aulia -",slug:"aulia-"}]},{id:"17635",title:"Computer-Based Control for Chemical Systems Using LabVIEW® in Conjunction with MATLAB®",slug:"computer-based-control-for-chemical-systems-using-labview-in-conjunction-with-matlab-",totalDownloads:6936,totalCrossrefCites:1,signatures:"Syamsul Rizal Abd Shukor, Reza Barzin and Abdul Latif Ahmad",authors:[{id:"46795",title:"Mr.",name:"Reza",middleName:null,surname:"Barzin",fullName:"Reza Barzin",slug:"reza-barzin"},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",fullName:"Abdul Latif Ahmad",slug:"abdul-latif-ahmad"},{id:"238365",title:"Associate Prof.",name:"Syamsul Rizal",middleName:null,surname:"Abd Shukor",fullName:"Syamsul Rizal Abd Shukor",slug:"syamsul-rizal-abd-shukor"}]},{id:"17636",title:"Dynamic Wi-Fi Reconfigurable FPGA Based Platform for Intelligent Traffic Systems",slug:"dynamic-wi-fi-reconfigurable-fpga-based-platform-for-intelligent-traffic-systems",totalDownloads:4074,totalCrossrefCites:2,signatures:"Mihai Hulea, George Dan Moiş and Silviu Folea",authors:[{id:"6084",title:"Prof.",name:"Silviu",middleName:null,surname:"Folea",fullName:"Silviu Folea",slug:"silviu-folea"},{id:"12986",title:"Prof.",name:"Mihai",middleName:null,surname:"Hulea",fullName:"Mihai Hulea",slug:"mihai-hulea"},{id:"112873",title:"MSc.",name:"George",middleName:null,surname:"Mois",fullName:"George Mois",slug:"george-mois"}]},{id:"17637",title:"Extending LabVIEW Aptitude for Distributed Controls and Data Acquisition",slug:"extending-labview-aptitude-for-distributed-controls-and-data-acquisition",totalDownloads:4663,totalCrossrefCites:0,signatures:"Luciano Catani",authors:[{id:"38843",title:"Dr.",name:"Luciano",middleName:null,surname:"Catani",fullName:"Luciano Catani",slug:"luciano-catani"}]},{id:"17638",title:"Graphical Programming Techniques for Effective, Fast and Responsive Execut",slug:"graphical-programming-techniques-for-effective-fast-and-responsive-execut",totalDownloads:4177,totalCrossrefCites:0,signatures:"Marko Jankovec",authors:[{id:"57662",title:"Dr.",name:"Marko",middleName:null,surname:"Jankovec",fullName:"Marko Jankovec",slug:"marko-jankovec"}]},{id:"17639",title:"The Importance of a Deep Knowledge of LabVIEW Environment and Techniques in Order to Develop Effective Applications",slug:"the-importance-of-a-deep-knowledge-of-labview-environment-and-techniques-in-order-to-develop-effecti",totalDownloads:9847,totalCrossrefCites:1,signatures:"Riccardo de Asmundis",authors:[{id:"43508",title:"Prof.",name:"Riccardo",middleName:null,surname:"de Asmundis",fullName:"Riccardo de Asmundis",slug:"riccardo-de-asmundis"}]}]},relatedBooks:[{type:"book",id:"1485",title:"Applications of Monte Carlo Method in Science and Engineering",subtitle:null,isOpenForSubmission:!1,hash:"08abe20f1549c83cfb208c83e12ee7df",slug:"applications-of-monte-carlo-method-in-science-and-engineering",bookSignature:"Shaul Mordechai",coverURL:"https://cdn.intechopen.com/books/images_new/1485.jpg",editedByType:"Edited by",editors:[{id:"21994",title:"Prof.",name:"Shaul",surname:"Mordechai",slug:"shaul-mordechai",fullName:"Shaul Mordechai"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"14004",title:"Monte Carlo Simulations in NDT",slug:"monte-carlo-simulations-in-ndt",signatures:"Frank Sukowski and Norman Uhlmann",authors:[{id:"20239",title:"Dr.",name:"Frank",middleName:null,surname:"Sukowski",fullName:"Frank Sukowski",slug:"frank-sukowski"},{id:"21967",title:"Dr.",name:"Norman",middleName:null,surname:"Uhlmann",fullName:"Norman Uhlmann",slug:"norman-uhlmann"}]},{id:"14005",title:"Application of Monte Carlo Simulation in Optical Tweezers",slug:"application-of-monte-carlo-simulation-in-optical-tweezers",signatures:"Yu-Xuan Ren, Jian-Guang Wu and Yin-Mei Li",authors:[{id:"18108",title:"Dr.",name:"Yu-Xuan",middleName:null,surname:"Ren",fullName:"Yu-Xuan Ren",slug:"yu-xuan-ren"},{id:"18109",title:"Dr.",name:"Jian-Guang",middleName:null,surname:"Wu",fullName:"Jian-Guang Wu",slug:"jian-guang-wu"},{id:"18110",title:"Dr.",name:"Yin-Mei",middleName:null,surname:"Li",fullName:"Yin-Mei Li",slug:"yin-mei-li"}]},{id:"14006",title:"Enabling Grids for GATE Monte-Carlo Radiation Therapy Simulations with the GATE-Lab",slug:"enabling-grids-for-gate-monte-carlo-radiation-therapy-simulations-with-the-gate-lab",signatures:"Sorina Camarasu-Pop, Tristan Glatard, Hugues Benoit-Cattin and David Sarrut",authors:[{id:"22422",title:"Dr.",name:"Sorina",middleName:null,surname:"Camarasu-Pop",fullName:"Sorina Camarasu-Pop",slug:"sorina-camarasu-pop"},{id:"22424",title:"Dr.",name:"Tristan",middleName:null,surname:"Glatard",fullName:"Tristan Glatard",slug:"tristan-glatard"},{id:"22425",title:"Dr.",name:"Hugues",middleName:null,surname:"Benoit-Cattin",fullName:"Hugues Benoit-Cattin",slug:"hugues-benoit-cattin"},{id:"22426",title:"Dr.",name:"David",middleName:null,surname:"Sarrut",fullName:"David Sarrut",slug:"david-sarrut"}]},{id:"14007",title:"Monte Carlo Simulation for Ion Implantation Profiles, Amorphous Layer Thickness Formed by the Ion Implantation, and Database Based on Pearson Function",slug:"monte-carlo-simulation-for-ion-implantation-profiles-amorphous-layer-thickness-formed-by-the-ion-imp",signatures:"Kunihiro Suzuki",authors:[{id:"18099",title:"Dr.",name:"Kunihiro",middleName:null,surname:"Suzuki",fullName:"Kunihiro Suzuki",slug:"kunihiro-suzuki"}]},{id:"14008",title:"Application of Monte Carlo Simulation in Industrial Microbiological Exposure Assessment",slug:"application-of-monte-carlo-simulation-in-industrial-microbiological-exposure-assessment",signatures:"Javier Collado, Antonio Falcó, Dolores Rodrigo, Fernando Sampedro, M. Consuelo Pina and Antonio Martínez",authors:[{id:"20154",title:"Prof.",name:"Antonio",middleName:null,surname:"Martinez",fullName:"Antonio Martinez",slug:"antonio-martinez"},{id:"20177",title:"Dr.",name:"Dolores",middleName:null,surname:"Rodrigo",fullName:"Dolores Rodrigo",slug:"dolores-rodrigo"},{id:"20178",title:"Dr.",name:"Fernando",middleName:null,surname:"Sampedro",fullName:"Fernando Sampedro",slug:"fernando-sampedro"},{id:"20179",title:"Dr.",name:"M. Consuelo",middleName:null,surname:"Pina",fullName:"M. Consuelo Pina",slug:"m.-consuelo-pina"},{id:"23606",title:"Dr.",name:"Javier",middleName:null,surname:"Collado",fullName:"Javier Collado",slug:"javier-collado"},{id:"23607",title:"Dr.",name:"Antonio",middleName:null,surname:"Falcó",fullName:"Antonio Falcó",slug:"antonio-falco"}]},{id:"14009",title:"Monte Carlo Simulation of Radiative Transfer in Atmospheric Environments for Problems Arising from Remote Sensing Measurements",slug:"monte-carlo-simulation-of-radiative-transfer-in-atmospheric-environments-for-problems-arising-from-r",signatures:"Margherita Premuda",authors:[{id:"19740",title:"Dr.",name:"Margherita",middleName:null,surname:"Premuda",fullName:"Margherita Premuda",slug:"margherita-premuda"}]},{id:"14010",title:"Monte Carlo Simulation of Pile-up Effect in Gamma Spectroscopy",slug:"monte-carlo-simulation-of-pile-up-effect-in-gamma-spectroscopy",signatures:"Ali Asghar Mowlavi, Mario de Denaro and Maria Rosa Fornasier",authors:[{id:"21124",title:"Dr.",name:"Ali Asghar",middleName:null,surname:"Mowlavi",fullName:"Ali Asghar Mowlavi",slug:"ali-asghar-mowlavi"},{id:"24843",title:"Dr.",name:"Mario",middleName:null,surname:"de Denaro",fullName:"Mario de Denaro",slug:"mario-de-denaro"},{id:"24844",title:"Dr.",name:"Maria Rosa",middleName:null,surname:"Fornasier",fullName:"Maria Rosa Fornasier",slug:"maria-rosa-fornasier"}]},{id:"14011",title:"Monte Carlo Simulations of Microchannel Plate–Based, Time-Gated X-ray Imagers",slug:"monte-carlo-simulations-of-microchannel-plate-based-time-gated-x-ray-imagers",signatures:"Craig A. Kruschwitz and Ming Wu",authors:[{id:"19775",title:"Dr.",name:"Ming",middleName:null,surname:"Wu",fullName:"Ming Wu",slug:"ming-wu"},{id:"22268",title:"Dr.",name:"Craig A.",middleName:null,surname:"Kruschwitz",fullName:"Craig A. Kruschwitz",slug:"craig-a.-kruschwitz"}]},{id:"14012",title:"Many-particle Monte Carlo Approach to Electron Transport",slug:"many-particle-monte-carlo-approach-to-electron-transport",signatures:"G. Albareda, F. L. Traversa, A. Benali and X. Oriols",authors:[{id:"22644",title:"Dr.",name:"Guillermo",middleName:null,surname:"Albareda",fullName:"Guillermo Albareda",slug:"guillermo-albareda"},{id:"22645",title:"Dr.",name:"Fabio",middleName:null,surname:"Traversa",fullName:"Fabio Traversa",slug:"fabio-traversa"},{id:"22646",title:"Dr.",name:"Abdelilah",middleName:null,surname:"Benali",fullName:"Abdelilah Benali",slug:"abdelilah-benali"},{id:"22647",title:"Dr.",name:"Xavier",middleName:null,surname:"Oriols",fullName:"Xavier Oriols",slug:"xavier-oriols"}]},{id:"14013",title:"Monte-Carlo Simulation in Electron Microscopy and Spectroscopy",slug:"monte-carlo-simulation-in-electron-microscopy-and-spectroscopy",signatures:"Vladimír Stary",authors:[{id:"23253",title:"Prof.",name:"Vladimir",middleName:null,surname:"Stary",fullName:"Vladimir Stary",slug:"vladimir-stary"}]},{id:"14014",title:"Monte Carlo Simulation of SEM and SAM Images",slug:"monte-carlo-simulation-of-sem-and-sam-images",signatures:"Y.G. Li, S.F. Mao and Z.J. Ding",authors:[{id:"23515",title:"Prof.",name:"Zejun",middleName:null,surname:"Ding",fullName:"Zejun Ding",slug:"zejun-ding"},{id:"23516",title:"Dr.",name:"Yonggang",middleName:null,surname:"Li",fullName:"Yonggang Li",slug:"yonggang-li"},{id:"23517",title:"Dr.",name:"Shifeng",middleName:null,surname:"Mao",fullName:"Shifeng Mao",slug:"shifeng-mao"}]},{id:"14015",title:"Monte Carlo Simulation of Insulating Gas Avalanche Development",slug:"monte-carlo-simulation-of-insulating-gas-avalanche-development",signatures:"Dengming Xiao",authors:[{id:"18115",title:"Dr.",name:"Dengming",middleName:null,surname:"Xiao",fullName:"Dengming Xiao",slug:"dengming-xiao"}]},{id:"14016",title:"Monte Carlo Simulation of Electron Dynamics in Doped Semiconductors Driven by Electric Fields: Harmonic Generation, Hot-Carrier Noise and Spin Relaxation",slug:"monte-carlo-simulation-of-electron-dynamics-in-doped-semiconductors-driven-by-electric-fields-harmon",signatures:"Dominique Persano Adorno",authors:[{id:"22347",title:"Dr.",name:"Dominique",middleName:null,surname:"Persano Adorno",fullName:"Dominique Persano Adorno",slug:"dominique-persano-adorno"}]},{id:"14017",title:"A Pearson Effective Potential for Monte-Carlo Simulation of Quantum Confinement Effects in nMOSFETs",slug:"a-pearson-effective-potential-for-monte-carlo-simulation-of-quantum-confinement-effects-in-nmosfets",signatures:"Marie-Anne Jaud, Sylvain Barraud, Philippe Dollfus, Jérôme Saint-Martin, Arnaud Bournel and Hervé Jaouen",authors:[{id:"21136",title:"Dr.",name:"Arnaud",middleName:null,surname:"Bournel",fullName:"Arnaud Bournel",slug:"arnaud-bournel"},{id:"21137",title:"Dr.",name:"Philippe",middleName:null,surname:"Dollfus",fullName:"Philippe Dollfus",slug:"philippe-dollfus"},{id:"21138",title:"Dr.",name:"Jérôme",middleName:null,surname:"Saint Martin",fullName:"Jérôme Saint Martin",slug:"jerome-saint-martin"},{id:"22614",title:"Dr.",name:"Marie-Anne",middleName:null,surname:"Jaud",fullName:"Marie-Anne Jaud",slug:"marie-anne-jaud"},{id:"22630",title:"Dr.",name:"Sylvain",middleName:null,surname:"Barraud",fullName:"Sylvain Barraud",slug:"sylvain-barraud"},{id:"22631",title:"Dr.",name:"Hervé",middleName:null,surname:"Jaouen",fullName:"Hervé Jaouen",slug:"herve-jaouen"}]},{id:"14018",title:"Monte Carlo Device Simulations",slug:"monte-carlo-device-simulations",signatures:"Dragica Vasileska, Katerina Raleva and Stephen M. Goodnick",authors:[{id:"3809",title:"Prof.",name:"Dragica",middleName:null,surname:"Vasileska",fullName:"Dragica Vasileska",slug:"dragica-vasileska"}]},{id:"14019",title:"Wang-Landau Algorithm and its Implementation for the Determination of Joint Density of States in Continuous Spin Models",slug:"wang-landau-algorithm-and-its-implementation-for-the-determination-of-joint-density-of-states-in-con",signatures:"Soumen Kumar Roy, Kisor Mukhopadhyay,\nNababrata Ghoshal and Shyamal Bhar",authors:[{id:"20638",title:"Dr.",name:"Soumen Kumar",middleName:null,surname:"Roy",fullName:"Soumen Kumar Roy",slug:"soumen-kumar-roy"},{id:"22592",title:"Dr.",name:"Kisor",middleName:null,surname:"Mukhopadhyay",fullName:"Kisor Mukhopadhyay",slug:"kisor-mukhopadhyay"},{id:"22593",title:"Mr.",name:"Nababrata",middleName:null,surname:"Ghoshal",fullName:"Nababrata Ghoshal",slug:"nababrata-ghoshal"},{id:"24345",title:"Mr.",name:"Shyamal",middleName:null,surname:"Bhar",fullName:"Shyamal Bhar",slug:"shyamal-bhar"}]},{id:"14020",title:"Characterizing Molecular Rotations using Monte Carlo Simulations",slug:"characterizing-molecular-rotations-using-monte-carlo-simulations",signatures:"Bart Verberck",authors:[{id:"22465",title:"Dr.",name:"Bart",middleName:null,surname:"Verberck",fullName:"Bart Verberck",slug:"bart-verberck"}]},{id:"14021",title:"Finite-time Scaling and its Applications to Continuous Phase Transitions",slug:"finite-time-scaling-and-its-applications-to-continuous-phase-transitions",signatures:"Fan Zhong",authors:[{id:"20182",title:"Dr.",name:"Fan",middleName:null,surname:"Zhong",fullName:"Fan Zhong",slug:"fan-zhong"}]},{id:"14022",title:"Using Monte Carlo Method to Study Magnetic Properties of Frozen Ferrofluid",slug:"using-monte-carlo-method-to-study-magnetic-properties-of-frozen-ferrofluid",signatures:"Tran Nguyen Lan and Tran Hoang Hai",authors:[{id:"19405",title:"Dr.",name:"Tran Nguyen",middleName:null,surname:"Lan",fullName:"Tran Nguyen Lan",slug:"tran-nguyen-lan"},{id:"19406",title:"Prof.",name:"Tran Hoang",middleName:null,surname:"Hai",fullName:"Tran Hoang Hai",slug:"tran-hoang-hai"}]},{id:"14023",title:"Monte Carlo Studies of Magnetic Nanoparticles",slug:"monte-carlo-studies-of-magnetic-nanoparticles",signatures:"K. Trohidou and M. Vasilakaki",authors:[{id:"21966",title:"Dr.",name:"Kalliopi",middleName:null,surname:"Trohidou",fullName:"Kalliopi Trohidou",slug:"kalliopi-trohidou"},{id:"22714",title:"Dr.",name:"Marianna",middleName:null,surname:"Vasilakaki",fullName:"Marianna Vasilakaki",slug:"marianna-vasilakaki"}]},{id:"14024",title:"Monte Carlo Simulation for Magnetic Domain Structure and Hysteresis Properties",slug:"monte-carlo-simulation-for-magnetic-domain-structure-and-hysteresis-properties",signatures:"Katsuhiko Yamaguchi, Kenji Suzuki and Osamu Nittono",authors:[{id:"22402",title:"Dr.",name:"Katsuhiko",middleName:null,surname:"Yamaguchi",fullName:"Katsuhiko Yamaguchi",slug:"katsuhiko-yamaguchi"},{id:"22659",title:"Prof.",name:"Kenji",middleName:null,surname:"Suzuki",fullName:"Kenji Suzuki",slug:"kenji-suzuki"},{id:"22660",title:"Prof.",name:"Osamu",middleName:null,surname:"Nittono",fullName:"Osamu Nittono",slug:"osamu-nittono"}]},{id:"14025",title:"Monte Carlo Simulations of Grain Growth in Polycrystalline Materials Using Potts Model",slug:"monte-carlo-simulations-of-grain-growth-in-polycrystalline-materials-using-potts-model",signatures:"Miroslav Morháč and Eva Morháčova",authors:[{id:"22290",title:"Dr.",name:"Miroslav",middleName:null,surname:"Morhac",fullName:"Miroslav Morhac",slug:"miroslav-morhac"},{id:"22408",title:"Dr.",name:"Eva",middleName:null,surname:"Morhacova",fullName:"Eva Morhacova",slug:"eva-morhacova"}]},{id:"14026",title:"Monte Carlo Simulations of Grain Growth in Metals",slug:"monte-carlo-simulations-of-grain-growth-in-metals",signatures:"Sven K. Esche",authors:[{id:"19228",title:"Prof.",name:"Sven K.",middleName:null,surname:"Esche",fullName:"Sven K. Esche",slug:"sven-k.-esche"}]},{id:"14027",title:"Monte Carlo Simulations on Defects in Hard-Sphere Crystals Under Gravity",slug:"monte-carlo-simulations-on-defects-in-hard-sphere-crystals-under-gravity",signatures:"Atsushi Mori",authors:[{id:"20749",title:"Dr.",name:"Atsushi",middleName:null,surname:"Mori",fullName:"Atsushi Mori",slug:"atsushi-mori"}]},{id:"14028",title:"Atomistic Monte Carlo Simulations in Steelmaking: High Temperature Carburization and Decarburization of Molten Steel",slug:"atomistic-monte-carlo-simulations-in-steelmaking-high-temperature-carburization-and-decarburization-",signatures:"R. Khanna, R. Mahjoub and V. Sahajwalla",authors:[{id:"19010",title:"Associate Prof.",name:"Rita",middleName:null,surname:"Khanna",fullName:"Rita Khanna",slug:"rita-khanna"}]},{id:"14029",title:"GCMC Simulations of Gas Adsorption in Carbon Pore Structures",slug:"gcmc-simulations-of-gas-adsorption-in-carbon-pore-structures",signatures:"Maria Konstantakou, Anastasios Gotzias, Michael Kainourgiakis, Athanasios K. Stubos and Theodore A. Steriotis",authors:[{id:"22788",title:"Dr.",name:"Theodore A.",middleName:null,surname:"Steriotis",fullName:"Theodore A. Steriotis",slug:"theodore-a.-steriotis"},{id:"22800",title:"Dr.",name:"Maria",middleName:null,surname:"Konstantakou",fullName:"Maria Konstantakou",slug:"maria-konstantakou"},{id:"22801",title:"Mr.",name:"Anastasios",middleName:null,surname:"Gotzias",fullName:"Anastasios Gotzias",slug:"anastasios-gotzias"},{id:"22802",title:"Dr.",name:"Michael",middleName:null,surname:"Kainourgiakis",fullName:"Michael Kainourgiakis",slug:"michael-kainourgiakis"},{id:"22803",title:"Dr.",name:"Athanasios",middleName:null,surname:"Stubos",fullName:"Athanasios Stubos",slug:"athanasios-stubos"}]},{id:"14030",title:"Effect of the Repulsive Interactions on the Nucleation and Island Growth: Kinetic Monte Carlo Simulations",slug:"effect-of-the-repulsive-interactions-on-the-nucleation-and-island-growth-kinetic-monte-carlo-simulat",signatures:"Hu Juanmei and Wu Fengmin",authors:[{id:"19969",title:"Dr.",name:"Fengmin",middleName:null,surname:"Wu",fullName:"Fengmin Wu",slug:"fengmin-wu"},{id:"33150",title:"Prof.",name:"Juanmei",middleName:null,surname:"Hu",fullName:"Juanmei Hu",slug:"juanmei-hu"}]},{id:"14031",title:"Monte Carlo Methodology for Grand Canonical Simulations of Vacancies at Crystalline Defects",slug:"monte-carlo-methodology-for-grand-canonical-simulations-of-vacancies-at-crystalline-defects",signatures:"Döme Tanguy",authors:[{id:"22170",title:"Dr.",name:"Döme",middleName:null,surname:"Tanguy",fullName:"Döme Tanguy",slug:"dome-tanguy"}]},{id:"14032",title:"Frequency-Dependent Monte Carlo Simulations of Phonon Transport in Nanostructures",slug:"frequency-dependent-monte-carlo-simulations-of-phonon-transport-in-nanostructures",signatures:"Qing Hao and Gang Chen",authors:[{id:"20961",title:"Prof.",name:"Gang",middleName:null,surname:"Chen",fullName:"Gang Chen",slug:"gang-chen"},{id:"20962",title:"Dr.",name:"Qing",middleName:null,surname:"Hao",fullName:"Qing Hao",slug:"qing-hao"}]},{id:"14033",title:"Performance Analysis of Adaptive GPS Signal Detection in Urban Interference Environment using the Monte Carlo Approach",slug:"performance-analysis-of-adaptive-gps-signal-detection-in-urban-interference-environment-using-the-mo",signatures:"V. Behar, Ch. Kabakchiev, I. Garvanov and H. Rohling",authors:[{id:"2768",title:"Dr.",name:"Christo",middleName:null,surname:"Kabakchiev",fullName:"Christo Kabakchiev",slug:"christo-kabakchiev"},{id:"18669",title:"Dr.",name:"Vera",middleName:null,surname:"Behar",fullName:"Vera Behar",slug:"vera-behar"},{id:"18671",title:"Dr.",name:"Ivan",middleName:null,surname:"Garvanov",fullName:"Ivan Garvanov",slug:"ivan-garvanov"},{id:"18672",title:"Prof.",name:"Hermann",middleName:null,surname:"Rohling",fullName:"Hermann Rohling",slug:"hermann-rohling"}]},{id:"14034",title:"Practical Monte Carlo Based Reliability Analysis and Design Methods for Geotechnical Problems",slug:"practical-monte-carlo-based-reliability-analysis-and-design-methods-for-geotechnical-problems",signatures:"Jianye Ching",authors:[{id:"19783",title:"Prof.",name:"Jianye",middleName:null,surname:"Ching",fullName:"Jianye Ching",slug:"jianye-ching"}]},{id:"14035",title:"A Monte Carlo Framework to Simulate Multicomponent Droplet Growth by Stochastic Coalescence",slug:"a-monte-carlo-framework-to-simulate-multicomponent-droplet-growth-by-stochastic-coalescence",signatures:"Lester Alfonso, Graciela Raga and Darrel Baumgardner",authors:[{id:"18046",title:"Prof.",name:"Lester",middleName:null,surname:"Alfonso",fullName:"Lester Alfonso",slug:"lester-alfonso"},{id:"22501",title:"Dr.",name:"Graciela",middleName:null,surname:"Raga",fullName:"Graciela Raga",slug:"graciela-raga"},{id:"22502",title:"Dr.",name:"Darrel",middleName:null,surname:"Baumgardner",fullName:"Darrel Baumgardner",slug:"darrel-baumgardner"}]},{id:"14036",title:"Monte Carlo Simulation of Room Temperature Ballistic Nanodevices",slug:"monte-carlo-simulation-of-room-temperature-ballistic-nanodevices",signatures:"Ignacio Íñiguez-de-la-Torre, Tomás González, Helena Rodilla, Beatriz G. Vasallo and Javier Mateos",authors:[{id:"22253",title:"Dr.",name:"Tomas",middleName:null,surname:"Gonzalez",fullName:"Tomas Gonzalez",slug:"tomas-gonzalez"},{id:"22450",title:"Dr.",name:"Javier",middleName:null,surname:"Mateos",fullName:"Javier Mateos",slug:"javier-mateos"},{id:"22451",title:"Dr.",name:"Ignacio",middleName:null,surname:"Iñiguez-de-la-Torre",fullName:"Ignacio Iñiguez-de-la-Torre",slug:"ignacio-iniguez-de-la-torre"},{id:"22452",title:"Prof.",name:"Helena",middleName:null,surname:"Rodilla",fullName:"Helena Rodilla",slug:"helena-rodilla"},{id:"22453",title:"Dr.",name:"Beatriz",middleName:null,surname:"Garcia Vasallo",fullName:"Beatriz Garcia Vasallo",slug:"beatriz-garcia-vasallo"}]},{id:"14037",title:"Estimation of Optical Properties in Postharvest and Processing Technology",slug:"estimation-of-optical-properties-in-postharvest-and-processing-technology",signatures:"László Baranyai",authors:[{id:"19663",title:"Dr.",name:"Laszlo",middleName:null,surname:"Baranyai",fullName:"Laszlo Baranyai",slug:"laszlo-baranyai"}]},{id:"14038",title:"MATLAB Programming of Polymerization Processes using Monte Carlo Techniques",slug:"matlab-programming-of-polymerization-processes-using-monte-carlo-techniques",signatures:"Mamdouh A. Al-Harthi",authors:[{id:"22395",title:"Prof.",name:"Mamdouh A.",middleName:null,surname:"Al-Harthi",fullName:"Mamdouh A. Al-Harthi",slug:"mamdouh-a.-al-harthi"}]},{id:"14039",title:"Monte Carlo Simulations in Solar Radio Astronomy",slug:"monte-carlo-simulations-in-solar-radio-astronomy",signatures:"G. Thejappa and R. J. MacDowall",authors:[{id:"21608",title:"Dr.",name:"Thejappa",middleName:null,surname:"Golla",fullName:"Thejappa Golla",slug:"thejappa-golla"}]},{id:"14040",title:"Using Monte Carlo Simulation for Prediction of Tool Life",slug:"using-monte-carlo-simulation-for-prediction-of-tool-life",signatures:"Sayyad Zahid Qamar, Anwar Khalil Sheikh, Tasneem Pervez and Abul Fazal M. Arif",authors:[{id:"21687",title:"Dr.",name:"Sayyad Zahid",middleName:null,surname:"Qamar",fullName:"Sayyad Zahid Qamar",slug:"sayyad-zahid-qamar"},{id:"21688",title:"Prof.",name:"Anwar Khalil",middleName:null,surname:"Sheikh",fullName:"Anwar Khalil Sheikh",slug:"anwar-khalil-sheikh"},{id:"21689",title:"Prof.",name:"Abul Fazal M.",middleName:null,surname:"Arif",fullName:"Abul Fazal M. Arif",slug:"abul-fazal-m.-arif"},{id:"21690",title:"Prof.",name:"Tasneem",middleName:null,surname:"Pervez",fullName:"Tasneem Pervez",slug:"tasneem-pervez"}]},{id:"14041",title:"Loss of Load Expectation Assessment in Electricity Markets using Monte Carlo Simulation and Neuro-Fuzzy Systems",slug:"loss-of-load-expectation-assessment-in-electricity-markets-using-monte-carlo-simulation-and-neuro-fu",signatures:"H. Haroonabadi",authors:[{id:"20037",title:"Dr.",name:"Hossein",middleName:null,surname:"Haroonabadi",fullName:"Hossein Haroonabadi",slug:"hossein-haroonabadi"}]},{id:"14042",title:"Automating First- and Second-order Monte Carlo Simulations for Markov Models in TreeAge Pro",slug:"automating-first-and-second-order-monte-carlo-simulations-for-markov-models-in-treeage-pro",signatures:"Benjamin P. Geisler",authors:[{id:"19631",title:"Dr.",name:"Benjamin",middleName:"Peter",surname:"Geisler",fullName:"Benjamin Geisler",slug:"benjamin-geisler"}]},{id:"14043",title:"Monte Carlo Simulations of Adsorbed Molecules on Ionic Surfaces",slug:"monte-carlo-simulations-of-adsorbed-molecules-on-ionic-surfaces",signatures:"Abdulwahab Khalil Sallabi",authors:[{id:"22986",title:"Prof.",name:"A",middleName:null,surname:"Slabi",fullName:"A Slabi",slug:"a-slabi"}]}]}]},onlineFirst:{chapter:{type:"chapter",id:"71586",title:"Wireless Sensor Networks (WSNs): Security and Privacy Issues and Solutions",doi:"10.5772/intechopen.84989",slug:"wireless-sensor-networks-wsns-security-and-privacy-issues-and-solutions",body:'\n
\n
1. Introduction
\n
Wireless sensor network (WSN), as shown in Figure 1, is a wireless interconnected network which consists of independently setup devices that monitor the conditions of its environment using sensors. WSNs are employed in a wide range of applications such as security surveillance, environmental monitoring, target tracking, military defense, intrusion detection, etc. Security in wireless sensor network is at a growing stage mainly not because of nonavailability of efficient security schemes, but most of the existing schemes are not suitable due to the peculiarity of WSNs. That is, WSNs’ nodes have low computational capacity and energy constraint. In WSNs, sensor nodes have the ability to communicate with one another, but their primary task is to sense, gather, and compute data. These data are forwarded, via multiple hops, to a sink which may use it or relay it to other networks. To achieve an effective communication, WSNs need efficient routing protocols [2, 3, 4, 5, 6]. They facilitate communication in WSNs by discovering the appropriate routes for transmitting data and maintain the routes for subsequent transmissions. As a result of heterogeneity of WSNs’ nodes, different protocols had been developed for different WSNs depending on the nature of the nodes and application. For instance, there are dedicated protocols for MWSNs and dedicated protocols for SWSNs.
\n
Figure 1.
A typical wireless sensor networks (WSN) [1].
\n
There are two modes of transmission in WSN; single hop involves the source node sending its data packets to the destination within a hop. Meanwhile, WSNs’ sensor nodes may rely on one another in order to relay packets to remote destinations. This mode of transmission is called multi-hop. Multi-hop is a routing phenomenon that involves the transfer of data between source and destination nodes with the cooperation of intermediary nodes. It enhances the performance of WSNs by allowing energy-depleted node to transfer data through its neighboring nodes along the routing path to the destination node. There are several security and privacy issues associated with multi-hop routing. Some of these issues like snooping, sinkhole, tampering Sybil, clone, wormhole, spoofing, etc. affect the integrity, availability, and data confidentiality of the WSNs.
\n
Several security solutions had been proposed for WSNs; however, resource constraint of sensors makes some of these security solutions unfit for WSNs. This, therefore, makes their adoption in WSNs impossible. This is as a result of instability of the topology of most WSNs. Some of the WSNs, unlike some other networks, consist of mobile nodes that intermittently change the topology of the networks, therefore making it impossible for such mobile network to use existing protocol developed for static nodes. Also, large volume of data is transferred on the WSNs; this increases the traffic on the wireless communication infrastructure of WSN. All these show that security and privacy solutions of WSN must not only be lightweight in terms of the computational, communication, and energy overheads but also support aggregation and multi-hop in order to reduce the traffics and extend the life span of the networks. Meanwhile, most of the existing security solutions do not have these performance requirements [1, 7, 8, 9, 10].
\n
\n
\n
2. Classification of WSNs protocols
\n
Routing protocols can be classified into:
Data-centric routing protocol
Hierarchical routing protocol
Multipath-based routing protocol
Location-based routing protocol
QoS-based routing protocol
Mobility-based routing protocol
\n\n
\n
2.1 Data-centric routing protocol
\n
Data-centric routing protocol combines data arriving from various sensor nodes at a specific route. This eliminates redundancies and minimizes the total amount of data transmission before forwarding it to the base station. Directed diffusion, rumor routing, and sensor protocol for information via negotiation (SPIN) protocol are examples of data-centric routing protocol [11, 12].
\n
SPIN is a negotiation-based data-centric protocol for WSNs. Each node uses metadata to name its data, and negotiation is performed by a sensor node using its metadata. Hence, each node is able to negotiate whether to deliver data or not, in order to eliminate redundant data transmission throughout the network. After the negotiation, the sender transmits its data as shown in Figure 2; node A starts by broadcasting its hop request to its neighboring node B. Once the request is accepted, node A sends its data to B who then repeats this procedure. This is to find its neighboring node and hops the data to the neighboring node until the data reaches the destination. SPIN protocol saves energy due to the fact that each node only performs single hop. SPIN’s hop request and acceptance packets prevent flooding attack on WSNs. Although SPIN protocol is good for lossless networks, it can also be used for lossy or mobile networks.
\n
Figure 2.
SPIN protocol.
\n
\n
\n
2.2 Hierarchical routing protocol
\n
Hierarchical routing protocol classifies network nodes into hierarchical clusters. For each of the clusters, the protocol selects a node with high residual energy as the cluster head. The sensed data of each node in the cluster are transferred through the cluster heads of the clusters in the network [11]. The cluster node aggregates the sensed data of all the nodes in the cluster before sending it to the sink. Hierarchical routing protocol reduces the energy consumption through multi-hop transmission mode [13]. Also, data aggregation performed by the cluster head reduces traffic on the network. Low-energy adaptive clustering hierarchy (LEACH), threshold-sensitive energy-efficient sensor network protocol (TEEN) and adaptive threshold-sensitive energy-efficient sensor network protocol (APTEEN), and secure hierarchical energy-efficient routing (SHEER) are examples of hierarchical routing protocol. TEEN gives a very good performance since it reduces the number of transmissions [14]. Patil et al. presented SHEER in [15]. It uses adaptive probabilistic transmission mechanism for determining the optimal route in WSN. SHEER also adopts hierarchical key establishment scheme (HIKES) for key distribution, authentication, and confidentiality. SHEER involves four phases as described below:
\n
\n
2.2.1 Initiation phase
\n
\n
The base station (BS), computes key \n\n\nK\nR\n\n=\nHMAC\n\n\n\nI\nR\n\n‖\n\nO\nR\n\n\n\n\n, generates a broadcast authentication token \n\n\nN\nR\n\n\n, and encrypts it as \n\n\nN\nR\nl\n\n=\n\nEnc\n\nK\nR\n\n\n\n\n\nN\nR\n\n\n\n. The base station pre-loads each sensor node with \n\n\nN\nR\nl\n\n\n and keeps \n\n\nI\nR\n\n\n and \n\n\nO\nR\n\n\n.
BS broadcasts the initiation call as \n\n\nN\nb\n\n\n‖\n\n\nI\nR\n\n\n‖\n\n\nO\nR\n\n\n‖\n\n\nEnc\n\nK\nR\n\n\n\n\n\ninit\n\n‖\n\n\nN\nb\n\n\n‖\n\n\nN\nR\n\n\n‖\n\nN\nR\n\n′\n′\n\n\n\n\n,\n\n where init is the initiation call, \n\n\nO\nR\n\n\n is the index, \n\n\nO\nR\n\n\n is the offset of \n\n\nK\nR\n\n\n, and \n\n\nN\nb\n\n\n is time stamp generated by BS.
On receiving the initiation message, the sensor node extracts and decrypts \n\n\nEnc\n\nK\nR\n\n\n\n\n\ninit\n\n‖\n\n\nN\nb\n\n\n‖\n\n\nN\nR\n\n\n‖\n\nN\nR\n\n′\n′\n\n\n\n\n\n, regenerates \n\nN\n\n′\nR\n\n\n, and compares it with the \n\n\nN\nR\n\n\n in the received initiation message. If they are similar, then the base station is successfully authenticated. It then replaces \n\n\nN\nR\n\n\n\nin the newly with \n\nN\n\n′\nR\n\n\n, sets its timer and starts the next phase.
\n\n
\n
\n
2.2.2 Neighbor discovery phase
\n
During the neighbor discovery phase, the sensor nodes establish their hopping link with their neighboring node. Each node switches from listening mode to transmission mode. In listening mode, node sends a HELLO message containing its identity, a nonce, and an encrypted header with the sensor key until it gets a reply from its neighboring nodes.
\n
\n
\n
2.2.3 Clustering phase
\n
In this phase, cluster consisting of certain number of nodes with a cluster head is selected based on some parameters.
\n
\n
\n
2.2.4 Data message exchange phase
\n
Each sensor sends its data to the base station through the cluster heads. This centralize data transmission reduces collision within clusters.
\n
\n
\n
\n
2.3 Multipath routing protocol
\n
For an effective data delivery, multipath routing protocol generates a multipath (primary and secondary paths) from the source node to the destination node. It uses secondary path in case the primary path fails. With this, fault tolerance is achieved. However, this increases the cost of routing through the cost of maintaining multiple paths between source and destination [10, 16]. There are different types of multipath-based routing protocols.
\n
\n
2.3.1 Disjoint path routing protocol
\n
In a disjoint path routing protocol, every source node finds the shortest disjointed multipath to the sink node. It evenly shares its data load among these disjointed paths. All the paths in this multipath share no sensor node. The protocol is reliable with extra overhead but at a low energy.
\n
\n
\n
2.3.2 Braided path routing protocol
\n
To construct braided multipath, the protocol first selects the primary path; then for every sensor, the best path is chosen from source to sink node, but this path does not include the primary node. The best alternative paths that are not necessarily disjoint from the primary path are called idealized braided multipath. These alternative paths are located either on the primary path or very close to it which means that the energy consumption on both the primary path and an alternative path is almost equal [17].
\n
\n
\n
2.3.3 N to 1 multipath discovery routing protocol
\n
N to 1 multipath discovery protocol is a protocol based on flooding. Example of N to 1 multipath-based routing protocol is multipath-based segment-by-segment routing (MSSR) protocol proposed by Lu et al. in [18]. MSSR protocol divides a single path into multiple segments, where multiple node-disjoint paths are discovered and independently maintained. N to 1 multipath discovery routing protocol reduces congestion, and effectively manages.
\n
\n
\n
\n
2.4 Location-based routing protocol
\n
Location-based routing protocol routes data based on the distance of the source and destination nodes. It calculates the distance between source and destination nodes in order to determine estimated routing energy. Shruti [19] proposed a location-based routing protocol. The protocol uses the signal strength of the incoming signal to determine their distance. In their protocol, all the non-active nodes are put in sleeping mode in order to save energy. In location-based, the knowledge of the position of sensor nodes is exploited to route the query from the base station to the event. Location information enables the network to select the best route.
\n
Another example of the location-based protocol is the geographic adaptive fidelity (GAF) protocol for mobile adhoc networks (MANETs). GAF conserves energy, and reduces routing overhead, which makes suitable for WSNs. Other examples of location-based protocols are location-aided routing (LAR), energy-efficient location-aided routing (EELAR), greedy location-aided routing protocol (GLAR), etc.
\n
\n
\n
2.5 Quality of service (QoS)-based routing protocol
\n
QoS-based routing protocol balances effective data delivery of the data to the sink node with some predetermined QoS metrics [17, 20]. Some of the existing QoS-based routing protocols are described below:
\n
\n
2.5.1 Sequential assignment outing (SAR) protocol
\n
SAR protocol uses energy, QoS on each path, and the priority level of each packet as the QoS metrics to achieve effective data delivery. SAR protocol discovers and uses multiple paths from the sink node to sensor nodes for effective data delivery. SAR protocol considers energy efficiency and fault tolerance and also focuses on minimizing the average weighted QoS metric during data transfer [21].
\n
\n
\n
2.5.2 SPEED protocol
\n
SPEED is also an example of QoS-based routing protocol. In SPEED, every sensor node keeps its neighboring node information in order to increase the performance of the protocol. For example, SPEED protocol has congestion avoidance mechanism that is used to avoid congestion. The mechanism relies on the node information. Routing module in SPEED is called stateless geographic nondeterministic forwarding (SGNF) and works together with four modules at the network layer. In this protocol, the total energy used for transmission is incomparable to the performance of the routing algorithm.
\n
\n
\n
2.5.3 QoS-aware and heterogeneously clustered routing (QHCR)
\n
It is an energy-efficient routing protocol used by heterogeneous WSNs for delay-sensitive, bandwidth-hungry, time-critical, and QoS-aware applications. The QHCR protocol provides dedicated paths for real-time applications as well as delay-sensitive applications at a lower energy. The QHCR protocol consists of information gathering, cluster head selection, and intra-cluster communication phases.
\n
\n
\n
\n
2.6 Mobility-based routing protocol
\n
Mobility-based routing protocol is a lightweight protocol that ensures data delivery from source to destination nodes. Tree-based efficient data dissemination protocol (TEDD), scalable energy-efficient asynchronous dissemination (SEAD), two-tier data dissemination (TTDD), and data MULES are some of the examples of mobility-based routing protocol. These routing protocols deal with the dynamism of the topology of the network. The closest node to the sink node tends to transmit more than others, which reduces its lifetime faster than other nodes [22]. Another example of the mobility-based routing protocol was the protocol proposed by Kim et al. [23]. The authors proposed a temperature-aware mobility algorithm for wireless sensor networks. Their algorithm employs store-and-carry mechanism to overcome the challenges posed by human postural mobility. In their store-and-carry-based routing protocol, routing packets are stored in a temporary memory called buffer. The buffer reroutes lost data to any intermediary node that temporarily lost connection with the source node. Their protocol also uses temperature to determine the intermediary node.
\n
Another example of mobility protocol is the routing protocol proposed by Kumar et al. in [24]. They use ant colony optimization (ACO) and endocrine cooperative particle swarm optimization (ECPSO) algorithms to enhance the performance of the WSNs.
\n
\n
\n
\n
3. Security and privacy issues in WSN
\n
Most of the existing WSN routing protocols and existing security solutions are unsuitable for WSNs. This is due to resources constraint associated with WSNs [25]. These constraints majorly determine the kind of security approaches that can be adopted for WSNs. Various security issues and their solutions are described in this section.
\n
\n
3.1 Security and privacy issues
\n
The increase in demand for a real-time information has made WSN become more expedient. WSNs most of the time employs multi-hop transmission mode to overcome their constraints. The major problem of multi-hop transmission is attacks on the source data and nodes’ identities during hopping. For a resource-constraint WSN with source node sending data to the destination through several intermediary nodes, there is a possibility of intrusion, identity tracing by an adversary, gleaning, and modification of source data by the intermediary nodes. WSNs, most times, operate in hostile environments and can be subjected to side channel attacks, such as differential power analysis. In these attacks, the adversary monitors the system, repeats the same operation, and takes careful measurements of power consumed in a cycle-by-cycle basis in order to either recover the secret key or perturb used in the perturbation. To prevent this, a scalar blinding is usually engaged in cryptographic-based security solutions. The scalar multiplication is blinded using integer m, where m is the order of the point P\n\n\n∈\n\nE\nq\n\n\n, such that \n\nmP\n=\n0\n\n. For example, instead of computing \n\nQ\n=\nkP\n\nmod\n\nq\n\n, \n\nQ\n=\n\n\nk\n+\nm\n\n\nP\n\nmod\n\nq\n\n is computed.
\n
Another issue in WSNs is how to preserve the identities of the source and destination nodes from the privy of intermediary nodes and adversaries during multi-hop. That is, there must be a form of lightweight authentication feature(s) inherent in the data packet between a source and destination nodes. Some other attacks on WSNs are discussed below.
\n
\n
3.1.1 Manipulating routing information
\n
This attack targets the routing information between two sensor nodes. It can be launched through spoofing or replaying the routing information. This can be done by adversaries who have the capability of creating routing loops, attracting or repelling network traffic, and extending or shortening source routes. This attack is a passive attack which is not only easy to launch but elusive to detection. However, a unique identity can be created for the selected path (using key-based hash function of the pseudonyms or identity of all the selected intermediate nodes and embellishes in the message, any attempt to record data packet from a location and re-tunnel it at another location will be detected by the base station when comparing the embellished path identity with hash of all the appended pseudonyms or identities of all the nodes involved in the multi-hop).
\n
\n
\n
3.1.2 Sybil attack
\n
In this attack, adversary compromises the WSN by creating fake identities to disrupt the network protocols. Sybil attack can lead to denial of services. It may also affect mapping during routing, since a Sybil node creates illegal identities in a bid to break down the one-to-one mapping between each node. Sybil is common in P2P networks and also extends to wireless sensor networks [8]. Moreover, detection and defense against Sybil attack is more challenging; this is due to the limited energy and computational capabilities of WSNs. Different efforts had been developed to thwart Sybil attack in WSN. An example is the use of a pair-wise key-based detection scheme which sets a threshold for the number of the identity that a node can use [21]. However, this requires pre-assignment of keys to sensor node.
\n
Another way to thwart Sybil attack is to validate identity of every node involved in routing. This can be reactively or proactively done. Reactively means prior to routing, a node must provide enough identification parameters to differentiate it from all other sensor nodes. The most common method is a resource test. Another way is to increase the cost against the benefit in identity generation [8]. That is, increasing cost of creating an identity and reducing the possible of having multiple identities will thwart Sybil attack, since the goal of a Sybil attacker is to acquire more identities. Also, traceable pseudonym and network-node identity generated by base station can be used to prevent a Sybil attack [9, 26].
\n
\n
\n
3.1.3 Sinkhole attack
\n
This attack prevents the sink node (base station) from obtaining the complete and correct data from the sensors, thus posing a threat to higher layer applications. In this attack, an adversary makes itself receptively attractive to its neighboring nodes in order to direct more traffics to itself [27, 28]. This results in adversary attracting all the traffics that is meant for the sink node. The adversary can then launch a more severe attack on the network, like selective forwarding, modifying, or dropping the packets. WSN is more vulnerable to this attack because its nodes most of the time send data to the base station [29].
\n
Meanwhile, a point-to-point authentication between source node, identifiable intermediate nodes, and end-to-end symmetric encryption between source and destination nodes can be used prevent sinkhole, Sybil, and sinkhole attacks. The attack is foiled once the adversary could not decrypt end-to-end symmetric encrypted data even if it successfully impersonates the node and receives its data packet [9].
\n
\n
\n
3.1.4 Clone attack
\n
In a clone attack, the attacker first attacks and captures the legitimate sensor nodes from the WSNs, collects all their information from their memories, copies them on multiple sensor nodes to create clone nodes, and finally deploys them to the network. Once a node is clone, adversary can then launch any other attacks. There are two different ways of detecting this attack: centralized and distributed approaches. Centralized uses sink node to detect and foil the activities of clone nodes, while distributed approach uses selected nodes to detect clone nodes and foil their activities in the network. Distributed approach is suitable for static WSNs because distributed techniques use nodes’ location information to detect clones and sensor nodes with the same identity, but different addresses are taken as clone nodes. Meanwhile, in mobile WSNs, it is a different thing entirely, sensor nodes keep changing their position, and these nodes keep joining and leaving the network. Hence, node location information is not considered as the best technique for detecting clone nodes. Clone node can launch the following attacks:
\n
\n
3.1.4.1 Selective forwarding attack
\n
Multi-hop-based WSN routing protocols assumed that all the neighboring nodes must re-hop their received data packets. Malicious nodes selectively forward some packets while dropping the others. Selective forwarding attacks are most effective when the adversary is actively involved in the data flow.
\n
\n
\n
3.1.4.2 HELLO flood attack
\n
This attack utilizes the connection between nodes. Most routing protocols require sensor nodes to broadcast HELLO packets to announce themselves to their neighboring nodes. An adversary may exploit this to deceive sensor nodes receiving the HELLO packet that they are within the radio range of the source node. In [30], the authors proposed a new method for detecting the HELLO flood attack based on distance. Here, nodes not only compare the RSS of the received HELLO packet but also compare the node’s distance to the selected cluster head (CH) with the threshold distance. Only those nodes whose RSS as well as distance falls within the threshold limits are allowed to join the network. For example, in the setup phase of LEACH protocol [31], CH sends its own location coordinates. The nodes receiving HELLO packets from CH calculate the distance \n\nDist\n\n as shown below:
Here, (x1; y1) are the coordinates of the sensor node receiving the packet, and (x2; y2) are the coordinates of CH. Each sensor node calculate the radio signal strength value (\n\nRSS\n\n) and distance between (\n\nDist\n\n). These are used to determine the cluster they belong in, that is, if \n\n\n\nRSS\n<\nThRSS and Dist\n<\nThDist\n\n\n\nthen Node\n=\n‘\nFriend of the cluster\n\n’ \n\notherwise not\n\na\n\nfriend\n\n of the cluster.
\n
\n
\n
3.1.4.3 Denial of service attack
\n
This type of attack exploits the weaknesses in the sensor network, by attempting to disrupt the sensor network. Denial of service (DoS) attack denies services to valid users [32]. In a safety-critical network, this kind of attack can be disastrous to the functionality of the network. One of the methods engaged by adversary to launch DoS is by flooding the network with messages in order to increase traffics on the network. The DOS attack can be detected through proper filtration of incoming messages based on the contents and identifying nodes with high number of faulty messages. Faulty messages are detected by checking for the contradiction between messages sent by neighboring nodes [33].
\n
\n
\n
\n
\n
3.2 Security and privacy solutions
\n
Recently, application of WSN has gained massive attention leading to new security challenges and design issues [34]. In this section, we discussed relevant research efforts on the development of security schemes for WSN using different approaches such as effective key management, public key infrastructure (PKI), multiclass nodes, as well as grouping of nodes to improve the security of routing protocols in WSNs.
\n
\n
3.2.1 Use of effective key management
\n
Du et al. presented a scheme with an example of an effective key management. Their scheme takes advantage of the high-end sensors in the heterogeneous networks. The performance evaluation and security analysis of their scheme show that the key management scheme provides better security with less complexity than the existing key management schemes [35]. The protocol pre-assigns a few keys in the L-sensor and a few keys to every H-sensor. This is because H-sensor is tamper-proof and has a larger memory than L-sensor. Their scheme uses asymmetric pre-distribution (AP) key management scheme since the number of pre-distributed keys in an H-sensor and in an L-sensor is different [12].
\n
\n
\n
3.2.2 Use of effective public key infrastructure
\n
Yu in [36] solved the security problem in WSN using the public key cryptography as a tool to ensure the authenticity of the sink node or base station. The approach consists of two phases; the first phase is node to sink handshake phase, where sink and sensor nodes set up session keys for secure data exchange. In the second phase, the session keys are used to encrypt data. Their scheme is very easy to implement, and requires a low computational power. The only limitation of their scheme is that all the participating nodes in the network have to agree on a common key prior to the exchange of data. However, any scheme based on a single key is vulnerable to the key compromise. That is, a compromised sensor node will not only compromise the shared key but also the whole network.
\n
Also, Chen et al. [37] presented a PKI-based approach to ensure secure keys exchange in the WSNs. Their scheme provides key management mechanism for wireless sensor network applications that can handle sink mobility and deliver data to neighboring nodes and sinks without failure. They also presented a method for detecting and thwarting DoS attack and data authentication encryption.
\n
\n
\n
3.2.3 Effective use of multiclass nodes
\n
Du et al. [38] presents a new secure routing protocol for heterogeneous sensor networks (HSNs), which is a two-tier secure routing (TTSR) protocol. The TTSR protocol consists of both intra-cluster routing and inter-cluster routing schemes. The intra-cluster routing forms a minimum spanning tree (shortest path tree) among L-sensors in a cluster for data forwarding. In case of inter-cluster routing, data packets are sent by H-sensors in the relay cells along the direction from the source node to the sink node. The tree-based routing and relay via relay cells of TTSR make it resistant to spoofing, selective forwarding, and sinkhole and wormhole attacks.
\n
Du [39] also proposed a novel QoS routing protocol that includes bandwidth calculation and slot reservation for mobile ad hoc networks (MANETS). Their QoS routing protocol takes advantage of the numerous transmission ability of multi-class nodes. Their protocol used three encryption keys:
A public key known by the sink and all other nodes
Node private key shared by two neighbor nodes and refreshed in the route discovery phase
A share primary key between node and sink node
\n\n
The QoS routing protocol divides transmission data into different data slices. Each slice is route through a unique route of the discovered multipath.
\n
\n
\n
3.2.4 Effective grouping of nodes to improve security of wireless sensor networks
\n
In group-based WSN security scheme, the dominating node processes the sensed information locally and prepares the authenticated report for the destination node [40]. In this category, sensor nodes are grouped into smaller clusters wherein each cell assigns a special sensor node to carry out all the burden of relaying multi-hop packets. Hence division of labor is possible in the network, which makes the scheme to consume low power. Zhang et al. in [41] presented a group-based security scheme for distributed wireless sensor networks; their scheme involves three entities: one or more sink nodes, Y number of group dominator nodes, and N number of ordinary sensor nodes.
\n
\n
\n
3.2.5 Point-to-point security solution
\n
Point-to-point security solution involves secure routing between every two nodes along the multi-hop path. To show the design and efficacy of point-to-point solution, we fully describe a typical point to point security solution for multi-hop based WSNs proposed in [9]. Olakanmi and Dada [9] proposed an effective point-to-point security scheme that engages point-to-point (PoP) mutual authentication scheme, perturbation, and pseudonym to overcome security and privacy issues in WSNs. To reduce computational cost and energy consumption, they used elliptic curve cryptography, hash function, and exclusive OR operations to evolve an efficient security solution for a decentralized WSNs. The network model, as shown in Figure 3, consists of base station (BS), immediate node (IN), source node (SN) or (sn), and destination node (DS) or (ds). The SNs and DSs are capable of multi-hop transmission; therefore any SN can become DS and vice versa.
\n
Figure 3.
Wireless sensor network system model.
\n
The PoP security scheme consists of the following phases: registration and key management, secure data exchange, perturbs generation, signature and obfuscation, authentication, and verification and decryption phases.
\n
\n
3.2.5.1 Registration and key management phase
\n
The serial number ψ of each node is sent to BS. BS then generates unique pseudonym and network-node identity as follows:
BS randomly generates \n\ns\n,\nρ\n∈\n\nZ\nq\n∗\n\n∗\n\n, as its master secret key pair, and computes and distributes its public parameter φ = (ρ + μ)P mod q, where P is the generator of elliptic curve \n\n\nE\nq\n\n\n and q is the order of \n\nE\n\n.
Each node i randomly selects a unique \n\n\nr\ni\n\n∈\n\nZ\nq\n∗\n\n\n, computes its two-way distribution parameter \n\n\nβ\ni\n\n\n as \n\n\nβ\ni\n\n\n = (\n\n\nr\ni\n\n\n + μ)P mod q, and broadcasts its \n\n\nβ\ni\n\n\n to other nodes in the network.
BS then computes \n\n\nN\ni\n\n\n as \n\n\nN\ni\n\n=\nH\n\n\nρ\n⊕\n\nψ\ni\n\n\n\n\n and pseudonym \n\n\nF\ni\n\n\n for each registered node as \n\n\nF\ni\n\n=\nH\n\n\n\nN\ni\n\n‖\ns\n‖\n\nψ\ni\n\n\n\n\n. It extracts the distribution parameter \n\n\nβ\ni\n\n\n of the node i in order to compute its node-base station shared key \n\n\nγ\n\nbs\n→\ni\n\n\n\n as \n\n\nγ\n\nbs\n→\ni\n\n\n\n = ρ\n\n\n\nβ\ni\n\n\n and sends the symmetrically encrypted node’s Fi\n and Ni\n as \n\n\nE\n\nγ\n\nbs\n→\ni\n\n\n\n\n (Fi\n) to node i.
On the receipt of its encrypted pseudonym, each node then generates its corresponding node-base station shared key as γ\n\ni → bs\n = riφ and uses it to decrypt the received encrypted pseudonym.
\n\n
\n
\n
3.2.5.2 Secure data exchange phase
\n
To send data M, the primary SN signs M and generates perturb to secure M. It then encrypts the obfuscated message packet as σ, using its node-destination shared key ϕsn→ds. The message packet σ contains the signature δ, perturbed data \n\n\nP\np\n\n\n, pseudonyms of the primary source node \n\n\nF\nsn\n\n\n, and destination node \n\n\nF\nds\n\n\n.
\n
\n
\n
3.2.5.3 Perturb generation phase
\n
The perturbation enforces first level of security on the data. It is used to remove semantic pattern caused by wide variation in the transmitted data. The perturbation uses a novel additive noise generation method to perturb the data M. Primary source and destination nodes independently generate a set of perturb \n\nλ\n\n for session \n\nτ\n\n as follows:
The SN and its destination node generate their perturbation parameters \n\n\nα\nsn\n\n\n, \n\n\nα\nds\n\n\n by randomly selecting a unique \n\n\nm\n1\n\n∈\n\nZ\nq\n∗\n\n\n and \n\n\n\nm\n2\n\n∈\n\nZ\nq\n∗\n\n\n, and compute \n\n\nα\nsn\n\n=\n\n\n\nm\n1\n\n+\nμ\n\n\nP\n\nmod\n\nq\n\n and \n\n\nα\nds\n\n\n\n\n\n=\n\n\n\nm\n2\n\n+\nμ\n\n\nPmod\n\nq\n\n, respectively.
Using the destination perturbation parameter \n\n\nα\nds\n\n\n for session, SN computes perturbation seed \n\nϑ\n\n as \n\nϑ\n=\n\nm\n1\n\n\nα\nds\n\n\n.
For session, SN generates the perturbation chain as \n\nλ\n=\n\n\nλ\n1\n\n\nλ\n2\n\n\n\nλ\n3\n\n…\n\nλ\nk\n\n\n\n\n, where λ1\n = Hϑ\n(ϑ|| \n\n\nF\nsn\n\n\n), λn\n = Hϑ\n(λ(n − 1)\n) for \n\nn\n=\n2\n…\nk\n\n. Clear all the perturbation parameters of perturb index \n\nn\n−\n1\n\n in its memory for session \n\nτ\n\n and destination node of pseudonym \n\n\nF\nds\n\n\n. It replaces its former encrypted perturbation parameters with the new one, that is, replaces [(λ\n\nn − 1\n||m1\n||n − 1||Fds\n) ⊕ ϑ] with [(λn\n||m1\n||n||Fds\n)⊕ ϑ].
Primary SN computes new perturb for every new data transmission of the same session by repeating step c using the previously used perturb \n\n\nλ\n\nn\n−\n1\n\n\n\n. However, for a new session and destination node, SN generates a new \n\nϑ\n\n by following steps (i)-(iii).
\n\n
\n
\n
3.2.5.4 Signature and perturbation phase
\n
Primary source node signs and perturbs the data packet through the following process:
Both the SN and destination nodes compute the source-destination shared session key ϕsn → ds\n as follows:
SN and destination nodes uniquely generate κ1 and κ2, respectively.
SN extracts the two-way distribution parameter of destination node βds to compute ϕsn → ds\n as ϕsn → ds\n = κ1βds\n.
\n
Sign its data M using its source-destination shared session key ϕsn → ds as δ = H ϕsn → ds\n (M), perturbs M as \n\n\nP\np\n\n\n = M + λn\n.
SN finally generates its message packet as σ = δ||\n\n\nP\np\n\n\n||Fi\n||Fj\n||n, and encrypts it as σσ\n = σ ⊕ ϕsn → ds\n to further ensure second-tier data confidentiality and integrity of the message and communication information, where Fi\n and Fj\n are the pseudonyms of the source and destination nodes, respectively.
SN then performs PoP authentication with its IN, as described in the next section, before hopping \n\n\nP\np\n\n\n to the IN.
\n\n
\n
\n
3.2.5.5 Authentication phase
\n
After the signature and perturbation phase, the source node initiates the PoP authentication with the IN as follows:
SN generates an authentication token \n\nω\n\n and time stamp \n\n\nt\ns\n\n\n.
SN and IN randomly generate υ ∈ \n\n\nZ\nq\n∗\n\n\n and ε ∈ \n\n\nZ\nq\n∗\n\n\n, respectively. SN computes its PoP authentication parameter as nsn\n = (υ + μ)P mod q, while IN computes its own as nin\n = (ε + μ)P mod q and sends it to SN, who then computes its PoP session authentication key φsn → in\n as φsn → in\n = υ.nin\n.
SN then encrypts the concatenated authentication token ω, pseudonym of source, pseudonym of IN, and time stamp as Eφsn → in\n (ω||Fsn\n||Fin\n||ts\n), concatenates it with nsn as Eφsn → in\n(ω||Fsn\n||Fin\n||ts\n))||nsn\n, and sends it to its IN.
On the receipt of Eφsn → in\n(ω ||Fsn\n||Fin\n||ts\n)||nsn\n, IN extracts nsn\n then computes its φ in→sn\n = ε.n\nsn\n. It decrypts the received Eφsn → in\n(ω||Fsn\n||Fin\n||ts\n) using its φsn → in\n to extract ω and ts. It, thereafter, re-encrypts the extracted ω and ts\n, using φin → sn\n, and sends it back to the SN. The SN decrypts it using its φsn → in\n and verifies it by comparing the ω and ts with their original values. If equal, SN hops its encrypted data packet σσ. The IN then becomes temporary SN and repeats this phase with its selected IN until the packet gets to the destination node.t
\n\n
\n
\n
3.2.5.6 Verification and decryption
\n
Destination node extracts and authenticates the received data M by following this procedure:
Destination node extracts the two-way distribution parameter of SN and βsn and computes destination of the used perturb P.
Destination node regenerates the used perturb \n\n\nλ\nn\n′\n\n\n by checking the value on the perturb index n. If n = 1, it indicates that the source is new to the destination node, and destination node then executes perturbation generation phase in order to obtain the perturb seed, which would be used to recompute the used perturb. However, if n > 1, it indicates that the session is for old destination node. The destination node retrieves the encrypted last perturb for the source node from its memory, decrypts it, and uses it to obtain the used perturb by executing step 3 of the perturbation generation phase. Extract the n message by unperturb \n\n\nP\nP\n\n\n as: \n\n\nM\n′\n\n\n = \n\n\nP\nP\n\n\n − \n\n\nλ\nn\n′\n\n\n\n.\n
Destination node verifies the signature by re-signing the unblinded message \n\n\nM\n′\n\n\n\nusing its ϕds → sn\n as \n\n\nδ\n′\n\n\n = Hϕds → sn\n (\n\n\nM\n′\n\n\n). If \n\n\nδ\n′\n\n\n = δ, then the perturb, data, and the source node are all valid, and destination node then accepts the data, otherwise rejects the data. Encrypt the perturbation parameter as λn ⊕ ϑ, m2 ⊕ ϑ, n ⊕ ϑ, Fsn\n. Clear all the previously encrypted perturbation parameters stored for Fsn\n in its memory, and replace it (λn||ϑ||m2||ϑ||n).
\n\n
\n
\n
\n
\n
\n
4. Conclusion
\n
This chapter shows overview of wireless sensor networks with its security and privacy framework. The chapter proffers to readers an in-depth understanding of security and privacy issues as related to WSNs. Some existing research in WSN routing protocols are discussed. This chapter also helps researchers to understand the current trends in WSNs routing protocols and security schemes.
\n
\n\n',keywords:"wireless sensor network, encryption, routing protocol, security, privacy",chapterPDFUrl:"https://cdn.intechopen.com/pdfs/71586.pdf",chapterXML:"https://mts.intechopen.com/source/xml/71586.xml",downloadPdfUrl:"/chapter/pdf-download/71586",previewPdfUrl:"/chapter/pdf-preview/71586",totalDownloads:375,totalViews:0,totalCrossrefCites:0,dateSubmitted:"August 28th 2018",dateReviewed:"February 6th 2019",datePrePublished:"March 29th 2020",datePublished:null,dateFinished:null,readingETA:"0",abstract:"Wireless sensor networks (WSNs) have become one of the current research areas, and it proves to be a very supportive technology for various applications such as environmental-, military-, health-, home-, and office-based applications. WSN can either be mobile wireless sensor network (MWSN) or static wireless sensor network (SWSN). MWSN is a specialized wireless network consisting of considerable number of mobile sensors, however the instability of its topology introduces several performance issues during data routing. SWSNs consisting of static nodes with static topology also share some of the security challenges of MWSNs due to some constraints associated with the sensor nodes. Security, privacy, computation and energy constraints, and reliability issues are the major challenges facing WSNs, especially during routing. To solve these challenges, WSN routing protocols must ensure confidentiality, integrity, privacy preservation, and reliability in the network. Thus, efficient and energy-aware countermeasures have to be designed to prevent intrusion in the network. In this chapter, we describe different forms of WSNs, challenges, solutions, and a point-to-point multi-hop-based secure solution for effective routing in WSNs.",reviewType:"peer-reviewed",bibtexUrl:"/chapter/bibtex/71586",risUrl:"/chapter/ris/71586",signatures:"Oladayo Olufemi Olakanmi and Adedamola Dada",book:{id:"7322",title:"Wireless Mesh Networks",subtitle:"Security, Architectures and Protocols",fullTitle:"Wireless Mesh Networks - Security, Architectures and Protocols",slug:"wireless-mesh-networks-security-architectures-and-protocols",publishedDate:"May 13th 2020",bookSignature:"Mutamed Khatib and Samer Alsadi",coverURL:"https://cdn.intechopen.com/books/images_new/7322.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"22273",title:"Dr.",name:"Mutamed",middleName:null,surname:"Khatib",slug:"mutamed-khatib",fullName:"Mutamed Khatib"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:null,sections:[{id:"sec_1",title:"1. Introduction",level:"1"},{id:"sec_2",title:"2. Classification of WSNs protocols",level:"1"},{id:"sec_2_2",title:"2.1 Data-centric routing protocol",level:"2"},{id:"sec_3_2",title:"2.2 Hierarchical routing protocol",level:"2"},{id:"sec_3_3",title:"2.2.1 Initiation phase",level:"3"},{id:"sec_4_3",title:"2.2.2 Neighbor discovery phase",level:"3"},{id:"sec_5_3",title:"2.2.3 Clustering phase",level:"3"},{id:"sec_6_3",title:"2.2.4 Data message exchange phase",level:"3"},{id:"sec_8_2",title:"2.3 Multipath routing protocol",level:"2"},{id:"sec_8_3",title:"2.3.1 Disjoint path routing protocol",level:"3"},{id:"sec_9_3",title:"2.3.2 Braided path routing protocol",level:"3"},{id:"sec_10_3",title:"2.3.3 N to 1 multipath discovery routing protocol",level:"3"},{id:"sec_12_2",title:"2.4 Location-based routing protocol",level:"2"},{id:"sec_13_2",title:"2.5 Quality of service (QoS)-based routing protocol",level:"2"},{id:"sec_13_3",title:"2.5.1 Sequential assignment outing (SAR) protocol",level:"3"},{id:"sec_14_3",title:"2.5.2 SPEED protocol",level:"3"},{id:"sec_15_3",title:"2.5.3 QoS-aware and heterogeneously clustered routing (QHCR)",level:"3"},{id:"sec_17_2",title:"2.6 Mobility-based routing protocol",level:"2"},{id:"sec_19",title:"3. Security and privacy issues in WSN",level:"1"},{id:"sec_19_2",title:"3.1 Security and privacy issues",level:"2"},{id:"sec_19_3",title:"3.1.1 Manipulating routing information",level:"3"},{id:"sec_20_3",title:"3.1.2 Sybil attack",level:"3"},{id:"sec_21_3",title:"3.1.3 Sinkhole attack",level:"3"},{id:"sec_22_3",title:"3.1.4 Clone attack",level:"3"},{id:"sec_22_4",title:"3.1.4.1 Selective forwarding attack",level:"4"},{id:"sec_23_4",title:"3.1.4.2 HELLO flood attack",level:"4"},{id:"sec_24_4",title:"3.1.4.3 Denial of service attack",level:"4"},{id:"sec_27_2",title:"3.2 Security and privacy solutions",level:"2"},{id:"sec_27_3",title:"3.2.1 Use of effective key management",level:"3"},{id:"sec_28_3",title:"3.2.2 Use of effective public key infrastructure",level:"3"},{id:"sec_29_3",title:"3.2.3 Effective use of multiclass nodes",level:"3"},{id:"sec_30_3",title:"3.2.4 Effective grouping of nodes to improve security of wireless sensor networks",level:"3"},{id:"sec_31_3",title:"3.2.5 Point-to-point security solution",level:"3"},{id:"sec_31_4",title:"3.2.5.1 Registration and key management phase",level:"4"},{id:"sec_32_4",title:"3.2.5.2 Secure data exchange phase",level:"4"},{id:"sec_33_4",title:"3.2.5.3 Perturb generation phase",level:"4"},{id:"sec_34_4",title:"3.2.5.4 Signature and perturbation phase",level:"4"},{id:"sec_35_4",title:"3.2.5.5 Authentication phase",level:"4"},{id:"sec_36_4",title:"3.2.5.6 Verification and decryption",level:"4"},{id:"sec_40",title:"4. Conclusion",level:"1"}],chapterReferences:[{id:"B1",body:'\nOladayo O, Abass A. A secure and energy-aware routing protocol for optimal routing in mobile wireless sensor networks (MWSNs). International Journal of Sensors, Wireless Communications and Control. 2019;9(Pt 4)\n'},{id:"B2",body:'\nSohrabi K, Gao J, Ailawadhi V, Pottie GJ. Protocols for self-organization of a wireless sensor network. IEEE Personal Communications. 2000;7(Pt 5):16-27\n'},{id:"B3",body:'\nVillalba LJG, Orozco ALS, Cabrera AT, Abbas CJB. Routing protocols in wireless sensor networks. International Journal of Medical Sciences. 2009:8399-8421\n'},{id:"B4",body:'\nMessaoudi A, Elkamel R, Helali A, Bouallegue R. Cross-layer based routing protocol for wireless sensor networks using a fuzzy logic module. In: Paper Presented at the 13th International Wireless Communications and Mobile Computing Conference (IWCMC); 2017\n'},{id:"B5",body:'\nHuei-Wen DR. A secure routing protocol for wireless sensor networks with consideration of energy efficiency. In: IEEE National Taiwan University of Science and Technology; 2012. pp. 224-32\n'},{id:"B6",body:'\nMurugaboopathi G, Khaana V. Reliable communications in sensor networks. Journal of Engineering and Applied Science. 2008;3:911-917. Available from: https://medwelljournals.com/abstract/?doi=jeasci.2008.911.917 [Accessed: 10 July 2017]\n'},{id:"B7",body:'\nSaraswati M, Prabhjot K. Energy efficient neighbor selection for flat wireless sensor networks. Information Technology and Management. 2013:518-523\n'},{id:"B8",body:'\nLv S, Wang X, Zhao X, Zhou X. Detecting the Sybil attack cooperatively in wireless sensor networks. In: Paper Presented at the International Conference on Computational Intelligence and Security; 2008\n'},{id:"B9",body:'\nOlakanmi O, Dada A. An efficient point-to-point security solution for multi-hop routing in wireless sensor networks. Security and Privacy. 2018\n'},{id:"B10",body:'\nOladayo O, Adama P. An efficient multipath routing protocol for decentralized wireless sensor networks for mission and safety-critical systems. International Journal of Sensors, Wireless Communications and Control. 2019;9(Pt 4)\n'},{id:"B11",body:'\nJamil I, Imad M. A secure hierarchical routing protocol for wireless sensor networks. In: Paper Presented on the 10th IEEE International Conference on Communication Systems; Singapore; 2006\n'},{id:"B12",body:'\nDu X, Xiao Y, Chen H-H, Wu Q. Secure cell relay routing protocol for sensor networks. Special Issue on Network Security. 2009;6(Pt 3):375-391\n'},{id:"B13",body:'\nMasruroh SU, Sabran KU. Emergency-aware and QoS based routing protocol in wireless sensor network. In: Paper Presented at the IEEE International Conference on Intelligent Autonomous Agents, Network and Systems; 2014\n'},{id:"B14",body:'\nManjeshwar A, Agrawal DP. TEEN: A routing protocol for enhanced efficiency in wireless sensor networks. In: Proceedings of 15th International Parallel and Distributed Processing Symposium; IPDPS; 2009-2015; San Francisco; 2001\n'},{id:"B15",body:'\nPatil M, Biradar RC. A survey on routing protocols in wireless sensor networks. In: Paper Presented at the 18th IEEE International Conference on Networks; Mandya; 2012\n'},{id:"B16",body:'\nDurrani N, Kafi N, Shamsi J, Haider W, Abbsi A. Secure multi-hop routing protocols in wireless sensor networks: Requirements, challenges, and solutions. In: Paper Presented at the 8th IEEE International Conference on Digital Information Management (ICDIM); 2013\n'},{id:"B17",body:'\nGoyal D, Tripathy MR. Routing protocol in wireless sensor networks: A survey. In: Paper Presented at the IEEE International Conference on Advanced Computing and Communication Technologies; Haryana; January 2012\n'},{id:"B18",body:'\nLu Y, Wang G, Jia W, Peng S. Multipath-based segment-by-segment routing protocol in MANETs. In: Paper Presented at the 9th International Conference for Young Computer Scientists; Hunan; November 2008\n'},{id:"B19",body:'\nShruti UK. Few locations based routing protocols in wireless sensor network. In: Paper Presented at International Conference on Green Computing and Internet of Things (ICGCloT); Chennai; 2015\n'},{id:"B20",body:'\nAmjad M, Afzal MK, Umer T, Kim B-S. QoS-aware and heterogeneously clustered routing protocol for wireless sensor networks. IEEE Access. 2017;5:10250-10262\n'},{id:"B21",body:'\nRaghunandan GH, Lakshmi BN. A comparative analysis of routing techniques for wireless sensor networks. In: Paper Presented at the IEEE Conference on Innovations in Emerging Technology; 2011. pp. 17-22\n'},{id:"B22",body:'\nKrishna KK, Augustine R. A survey on mobility based routing protocols in wireless sensor networks. International Journal of Computer Applications. 2016;135(5):36-38\n'},{id:"B23",body:'\nKim B-S, Kang SY, Lim JH, Kim KH, Krishna KK, Augustine R. A survey on mobility based routing protocols in wireless sensor networks. International Journal of Computers. 2017\n'},{id:"B24",body:'\nKumar J, Tripathi S, Tiwari RK. Routing protocol for wireless sensor networks using swarm intelligence-ACO with ECPSOA. In: Paper Presented at the International Conference of Information Technology; 2016\n'},{id:"B25",body:'\nObaidat MS, Li J-S. Security in wireless sensor networks. Security and Communication Networks. 2016;1(Pt 1):101-103\n'},{id:"B26",body:'\nZhang J, Varadharajan V. A new security scheme for wireless sensor networks. In: IEEE Global Communications Conference (GLOBECOM) Proceedings; Hong Kong; 2008. pp. 1-5\n'},{id:"B27",body:'\nQi J, Hong T, Xiaohui K, Qiang L. Detection and defence of sinkhole attack in wireless sensor network. In: Paper Presented at the IEEE 14th International Conference on Communication Technology; Chengdu; 2012\n'},{id:"B28",body:'\nAmisha P, Vaghelab VB. Detection and prevention of wormhole attack in wireless sensor network using AOMDV protocol. In: Paper Presented at the 7th International Conference on Communication, Computing and Virtualization; 2016\n'},{id:"B29",body:'\nAhmad Salehi S, Razzaque MA, Naraei P, Farrokhtala A. Detection of sinkhole attack in wireless sensor networks. In: Paper Presented at the IEEE International Conference on Space Science and Communication (IconSpace); 2013\n'},{id:"B30",body:'\nMagotra S, Kumar K. Detection of HELLO flood attack on LEACH protocol. In: Paper Presented at the IEEE International Advance Computing Conference (IACC); 2015\n'},{id:"B31",body:'\nXiangning F, Yulin S. Improvement on LEACH protocol of wireless sensor network. In: Paper Presented at the IEEE International Conference on Sensor Technologies and Applications; 2007\n'},{id:"B32",body:'\nRaymond DR, Midkiff SF. Denial-of-service in wireless sensor networks: Attacks and defences. IEEE Pervasive Computing. 2008;7(Pt 1):74-81\n'},{id:"B33",body:'\nRamkumar M. Proxy aided key pre-distribution schemes for sensor networks. In: Paper Presented at the IEEE International Conference on Performance, Computing, and Communications; 2010. pp. 461-68\n'},{id:"B34",body:'\nGungor VC, Lu B, Hancke GP. Opportunities and challenges of wireless sensor networks in smart grid. IEEE Transactions on Industrial Electronics. 2010;57:3557-3564\n'},{id:"B35",body:'\nDu X, Guizani M, Xiao Y, Chen H-H. An effective key management scheme for heterogeneous sensor networks Francisco; December 2006\n'},{id:"B36",body:'\nYu Z. The scheme of public key infrastructure for improving wireless sensor networks security. In: Paper Presented at the IEEE International Conference on Computer Science and Automation Engineering IEEE Transactions; Manchester; 2012\n'},{id:"B37",body:'\nChen J-L, Lai Y-F, Lu H-F, Kuo Q-C. Public-key based security scheme for wireless sensor network. In: IEEE Radio and Wireless Symposium 2008. pp. 255-258\n'},{id:"B38",body:'\nDu X. Two tier secure routing protocol for heterogeneous sensor networks. IEEE Transactions on Wireless Communications. 2007;6(Pt 9):3395-3401\n'},{id:"B39",body:'\nDu X. QoS routing based on multi-class nodes for mobile. Ad Hoc Networks. 2004;2(Pt 3):241-254\n'},{id:"B40",body:'\nAbdul Hamid M, Mustazur Rahman M, Yoon YJ, Hong CS. Developing a group-based security scheme for wireless sensor networks. In: IEEE Global Communications Conference (GLOBECOM) Proceedings; 2007\n'},{id:"B41",body:'\nLi-Ping Z, Yi W, Gui-Ling L. A novel group key agreement protocol for wireless sensor networks. In: Paper Presented at the International Conference on Wireless Communication and Signal Processing; Beijing; 2009\n'}],footnotes:[],contributors:[{corresp:"yes",contributorFullName:"Oladayo Olufemi Olakanmi",address:"olakanmi@mit.edu",affiliation:'
Department of Electrical and Electronic Engineering, University of Ibadan, Nigeria
Department of Electrical and Electronic Engineering, University of Ibadan, Nigeria
'}],corrections:null},book:{id:"7322",title:"Wireless Mesh Networks",subtitle:"Security, Architectures and Protocols",fullTitle:"Wireless Mesh Networks - Security, Architectures and Protocols",slug:"wireless-mesh-networks-security-architectures-and-protocols",publishedDate:"May 13th 2020",bookSignature:"Mutamed Khatib and Samer Alsadi",coverURL:"https://cdn.intechopen.com/books/images_new/7322.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"22273",title:"Dr.",name:"Mutamed",middleName:null,surname:"Khatib",slug:"mutamed-khatib",fullName:"Mutamed Khatib"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}}},profile:{item:{id:"24568",title:"Prof.",name:"Fakir",middleName:null,surname:"Mohamed",email:"fakfad@yahoo.fr",fullName:"Fakir Mohamed",slug:"fakir-mohamed",position:null,biography:null,institutionString:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",totalCites:0,totalChapterViews:"0",outsideEditionCount:0,totalAuthoredChapters:"1",totalEditedBooks:"0",personalWebsiteURL:null,twitterURL:null,linkedinURL:null,institution:null},booksEdited:[],chaptersAuthored:[{title:"Recognition of Tifinaghe Characters Using Dynamic Programming & Neural Network",slug:"recognition-of-tifinaghe-characters-using-dynamic-programming-neural-network",abstract:null,signatures:"Rachid El Ayachi, Mohamed Fakir and Belaid Bouikhalene",authors:[{id:"24568",title:"Prof.",name:"Fakir",surname:"Mohamed",fullName:"Fakir Mohamed",slug:"fakir-mohamed",email:"fakfad@yahoo.fr"},{id:"34252",title:"Dr.",name:"El Ayachi",surname:"Rachid",fullName:"El Ayachi Rachid",slug:"el-ayachi-rachid",email:"rachidieea@yahoo.fr"},{id:"34253",title:"Prof.",name:"Bouikhalene",surname:"Belaid",fullName:"Bouikhalene Belaid",slug:"bouikhalene-belaid",email:"bbouikhalene@yahoo.fr"}],book:{title:"Recent Advances in Document Recognition and Understanding",slug:"recent-advances-in-document-recognition-and-understanding",productType:{id:"1",title:"Edited Volume"}}}],collaborators:[{id:"24668",title:"Prof.",name:"Maher",surname:"Khemakhem",slug:"maher-khemakhem",fullName:"Maher Khemakhem",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"26282",title:"Prof.",name:"Lin",surname:"Wang",slug:"lin-wang",fullName:"Lin Wang",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"26435",title:"Dr.",name:"Bartłomiej",surname:"Starosta",slug:"bartlomiej-starosta",fullName:"Bartłomiej Starosta",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Polish-Japanese Academy of Information Technology",institutionURL:null,country:{name:"Poland"}}},{id:"29541",title:"Dr.",name:"Richard",surname:"Tuwiler",slug:"richard-tuwiler",fullName:"Richard Tuwiler",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"34252",title:"Dr.",name:"El Ayachi",surname:"Rachid",slug:"el-ayachi-rachid",fullName:"El Ayachi Rachid",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"34253",title:"Prof.",name:"Bouikhalene",surname:"Belaid",slug:"bouikhalene-belaid",fullName:"Bouikhalene Belaid",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"36349",title:"Mr.",name:"Aria",surname:"Pezeshk",slug:"aria-pezeshk",fullName:"Aria Pezeshk",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"97770",title:"MSc.",name:"Mohamed",surname:"Labidi",slug:"mohamed-labidi",fullName:"Mohamed Labidi",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"97772",title:"Prof.",name:"Mohamed",surname:"Jemni",slug:"mohamed-jemni",fullName:"Mohamed Jemni",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Tunis University",institutionURL:null,country:{name:"Tunisia"}}},{id:"116759",title:"Prof.",name:"Seiichi",surname:"Uchida",slug:"seiichi-uchida",fullName:"Seiichi Uchida",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Kyushu University",institutionURL:null,country:{name:"Japan"}}}]},generic:{page:{slug:"OA-publishing-fees",title:"Open Access Publishing Fees",intro:"
The Open Access model is applied to all of our publications and is designed to eliminate subscriptions and pay-per-view fees. This approach ensures free, immediate access to full text versions of your research.
As a gold Open Access publisher, an Open Access Publishing Fee is payable on acceptance following peer review of the manuscript. In return, we provide high quality publishing services and exclusive benefits for all contributors. IntechOpen is the trusted publishing partner of over 118,000 international scientists and researchers.
\\n\\n
The Open Access Publishing Fee (OAPF) is payable only after your full chapter, monograph or Compacts monograph is accepted for publication.
\\n\\n
OAPF Publishing Options
\\n\\n
\\n\\t
1,400 GBP Chapter - Edited Volume
\\n\\t
10,000 GBP Monograph - Long Form
\\n\\t
4,000 GBP Compacts Monograph - Short Form
\\n
\\n\\n
*These prices do not include Value-Added Tax (VAT). Residents of European Union countries need to add VAT based on the specific rate in their country of residence. Institutions and companies registered as VAT taxable entities in their own EU member state will not pay VAT as long as provision of the VAT registration number is made during the application process. This is made possible by the EU reverse charge method.
\\n\\n
Services included are:
\\n\\n
\\n\\t
An online manuscript tracking system to facilitate your work
\\n\\t
Personal contact and support throughout the publishing process from your dedicated Author Service Manager
\\n\\t
Assurance that your manuscript meets the highest publishing standards
\\n\\t
English language copyediting and proofreading, including the correction of grammatical, spelling, and other common errors
\\n\\t
XML Typesetting and pagination - web (PDF, HTML) and print files preparation
\\n\\t
Discoverability - electronic citation and linking via DOI
\\n\\t
Permanent and unrestricted online access to your work
What isn't covered by the Open Access Publishing Fee?
\\n\\n
If your manuscript:
\\n\\n
\\n\\t
Exceeds 20 pages (for chapters in Edited Volumes), an additional fee of 40 GBP per page will be required
\\n\\t
If a manuscript requires Heavy Editing or Language Polishing, this will incur additional fees.
\\n
\\n\\n
Your Author Service Manager will inform you of any items not covered by the OAPF and provide exact information regarding those additional costs before proceeding.
\\n\\n
Open Access Funding
\\n\\n
To explore funding opportunities and learn more about how you can finance your IntechOpen publication, go to our Open Access Funding page. IntechOpen offers expert assistance to all of its Authors. We can support you in approaching funding bodies and institutions in relation to publishing fees by providing information about compliance with the Open Access policies of your funder or institution. We can also assist with communicating the benefits of Open Access in order to support and strengthen your funding request and provide personal guidance through your application process. You can contact us at oapf@intechopen.com for further details or assistance.
\\n\\n
For Authors who are still unable to obtain funding from their institutions or research funding bodies for individual projects, IntechOpen does offer the possibility of applying for a Waiver to offset some or all processing feed. Details regarding our Waiver Policy can be found here.
\\n\\n
Added Value of Publishing with IntechOpen
\\n\\n
Choosing to publish with IntechOpen ensures the following benefits:
\\n\\n
\\n\\t
Indexing and listing across major repositories, see details ...
\\n\\t
Long-term archiving
\\n\\t
Visibility on the world's strongest OA platform
\\n\\t
Live Performance Metrics to track readership and the impact of your chapter
\\n\\t
Dissemination and Promotion
\\n
\\n\\n
Benefits of Publishing with IntechOpen
\\n\\n
\\n\\t
Proven world leader in Open Access book publishing with over 10 years experience
\\n\\t
+4,800 OA books published
\\n\\t
Most competitive prices in the market
\\n\\t
Fully compliant with OA funding requirements
\\n\\t
Optimized processes, enabling publication between 8 and 12 months
\\n\\t
Personal support during every step of the publication process
\\n\\t
+146,150 citations in Web of Science databases
\\n\\t
Currently strongest OA platform with over 130 million downloads
As a gold Open Access publisher, an Open Access Publishing Fee is payable on acceptance following peer review of the manuscript. In return, we provide high quality publishing services and exclusive benefits for all contributors. IntechOpen is the trusted publishing partner of over 118,000 international scientists and researchers.
\n\n
The Open Access Publishing Fee (OAPF) is payable only after your full chapter, monograph or Compacts monograph is accepted for publication.
\n\n
OAPF Publishing Options
\n\n
\n\t
1,400 GBP Chapter - Edited Volume
\n\t
10,000 GBP Monograph - Long Form
\n\t
4,000 GBP Compacts Monograph - Short Form
\n
\n\n
*These prices do not include Value-Added Tax (VAT). Residents of European Union countries need to add VAT based on the specific rate in their country of residence. Institutions and companies registered as VAT taxable entities in their own EU member state will not pay VAT as long as provision of the VAT registration number is made during the application process. This is made possible by the EU reverse charge method.
\n\n
Services included are:
\n\n
\n\t
An online manuscript tracking system to facilitate your work
\n\t
Personal contact and support throughout the publishing process from your dedicated Author Service Manager
\n\t
Assurance that your manuscript meets the highest publishing standards
\n\t
English language copyediting and proofreading, including the correction of grammatical, spelling, and other common errors
\n\t
XML Typesetting and pagination - web (PDF, HTML) and print files preparation
\n\t
Discoverability - electronic citation and linking via DOI
\n\t
Permanent and unrestricted online access to your work
What isn't covered by the Open Access Publishing Fee?
\n\n
If your manuscript:
\n\n
\n\t
Exceeds 20 pages (for chapters in Edited Volumes), an additional fee of 40 GBP per page will be required
\n\t
If a manuscript requires Heavy Editing or Language Polishing, this will incur additional fees.
\n
\n\n
Your Author Service Manager will inform you of any items not covered by the OAPF and provide exact information regarding those additional costs before proceeding.
\n\n
Open Access Funding
\n\n
To explore funding opportunities and learn more about how you can finance your IntechOpen publication, go to our Open Access Funding page. IntechOpen offers expert assistance to all of its Authors. We can support you in approaching funding bodies and institutions in relation to publishing fees by providing information about compliance with the Open Access policies of your funder or institution. We can also assist with communicating the benefits of Open Access in order to support and strengthen your funding request and provide personal guidance through your application process. You can contact us at oapf@intechopen.com for further details or assistance.
\n\n
For Authors who are still unable to obtain funding from their institutions or research funding bodies for individual projects, IntechOpen does offer the possibility of applying for a Waiver to offset some or all processing feed. Details regarding our Waiver Policy can be found here.
\n\n
Added Value of Publishing with IntechOpen
\n\n
Choosing to publish with IntechOpen ensures the following benefits:
\n\n
\n\t
Indexing and listing across major repositories, see details ...
\n\t
Long-term archiving
\n\t
Visibility on the world's strongest OA platform
\n\t
Live Performance Metrics to track readership and the impact of your chapter
\n\t
Dissemination and Promotion
\n
\n\n
Benefits of Publishing with IntechOpen
\n\n
\n\t
Proven world leader in Open Access book publishing with over 10 years experience
\n\t
+4,800 OA books published
\n\t
Most competitive prices in the market
\n\t
Fully compliant with OA funding requirements
\n\t
Optimized processes, enabling publication between 8 and 12 months
\n\t
Personal support during every step of the publication process
\n\t
+146,150 citations in Web of Science databases
\n\t
Currently strongest OA platform with over 130 million downloads
\n
\n'}]},successStories:{items:[]},authorsAndEditors:{filterParams:{sort:"featured,name"},profiles:[{id:"6700",title:"Dr.",name:"Abbass A.",middleName:null,surname:"Hashim",slug:"abbass-a.-hashim",fullName:"Abbass A. Hashim",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/6700/images/1864_n.jpg",biography:"Currently I am carrying out research in several areas of interest, mainly covering work on chemical and bio-sensors, semiconductor thin film device fabrication and characterisation.\nAt the moment I have very strong interest in radiation environmental pollution and bacteriology treatment. The teams of researchers are working very hard to bring novel results in this field. I am also a member of the team in charge for the supervision of Ph.D. students in the fields of development of silicon based planar waveguide sensor devices, study of inelastic electron tunnelling in planar tunnelling nanostructures for sensing applications and development of organotellurium(IV) compounds for semiconductor applications. I am a specialist in data analysis techniques and nanosurface structure. I have served as the editor for many books, been a member of the editorial board in science journals, have published many papers and hold many patents.",institutionString:null,institution:{name:"Sheffield Hallam University",country:{name:"United Kingdom"}}},{id:"54525",title:"Prof.",name:"Abdul Latif",middleName:null,surname:"Ahmad",slug:"abdul-latif-ahmad",fullName:"Abdul Latif Ahmad",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"20567",title:"Prof.",name:"Ado",middleName:null,surname:"Jorio",slug:"ado-jorio",fullName:"Ado Jorio",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Universidade Federal de Minas Gerais",country:{name:"Brazil"}}},{id:"47940",title:"Dr.",name:"Alberto",middleName:null,surname:"Mantovani",slug:"alberto-mantovani",fullName:"Alberto Mantovani",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"12392",title:"Mr.",name:"Alex",middleName:null,surname:"Lazinica",slug:"alex-lazinica",fullName:"Alex Lazinica",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/12392/images/7282_n.png",biography:"Alex Lazinica is the founder and CEO of IntechOpen. After obtaining a Master's degree in Mechanical Engineering, he continued his PhD studies in Robotics at the Vienna University of Technology. Here he worked as a robotic researcher with the university's Intelligent Manufacturing Systems Group as well as a guest researcher at various European universities, including the Swiss Federal Institute of Technology Lausanne (EPFL). During this time he published more than 20 scientific papers, gave presentations, served as a reviewer for major robotic journals and conferences and most importantly he co-founded and built the International Journal of Advanced Robotic Systems- world's first Open Access journal in the field of robotics. Starting this journal was a pivotal point in his career, since it was a pathway to founding IntechOpen - Open Access publisher focused on addressing academic researchers needs. Alex is a personification of IntechOpen key values being trusted, open and entrepreneurial. Today his focus is on defining the growth and development strategy for the company.",institutionString:null,institution:{name:"TU Wien",country:{name:"Austria"}}},{id:"19816",title:"Prof.",name:"Alexander",middleName:null,surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/19816/images/1607_n.jpg",biography:"Alexander I. Kokorin: born: 1947, Moscow; DSc., PhD; Principal Research Fellow (Research Professor) of Department of Kinetics and Catalysis, N. Semenov Institute of Chemical Physics, Russian Academy of Sciences, Moscow.\r\nArea of research interests: physical chemistry of complex-organized molecular and nanosized systems, including polymer-metal complexes; the surface of doped oxide semiconductors. He is an expert in structural, absorptive, catalytic and photocatalytic properties, in structural organization and dynamic features of ionic liquids, in magnetic interactions between paramagnetic centers. The author or co-author of 3 books, over 200 articles and reviews in scientific journals and books. He is an actual member of the International EPR/ESR Society, European Society on Quantum Solar Energy Conversion, Moscow House of Scientists, of the Board of Moscow Physical Society.",institutionString:null,institution:{name:"Semenov Institute of Chemical Physics",country:{name:"Russia"}}},{id:"62389",title:"PhD.",name:"Ali Demir",middleName:null,surname:"Sezer",slug:"ali-demir-sezer",fullName:"Ali Demir Sezer",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/62389/images/3413_n.jpg",biography:"Dr. Ali Demir Sezer has a Ph.D. from Pharmaceutical Biotechnology at the Faculty of Pharmacy, University of Marmara (Turkey). He is the member of many Pharmaceutical Associations and acts as a reviewer of scientific journals and European projects under different research areas such as: drug delivery systems, nanotechnology and pharmaceutical biotechnology. Dr. Sezer is the author of many scientific publications in peer-reviewed journals and poster communications. Focus of his research activity is drug delivery, physico-chemical characterization and biological evaluation of biopolymers micro and nanoparticles as modified drug delivery system, and colloidal drug carriers (liposomes, nanoparticles etc.).",institutionString:null,institution:{name:"Marmara University",country:{name:"Turkey"}}},{id:"61051",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:null},{id:"100762",title:"Prof.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"St David's Medical Center",country:{name:"United States of America"}}},{id:"107416",title:"Dr.",name:"Andrea",middleName:null,surname:"Natale",slug:"andrea-natale",fullName:"Andrea Natale",position:null,profilePictureURL:"//cdnintech.com/web/frontend/www/assets/author.svg",biography:null,institutionString:null,institution:{name:"Texas Cardiac Arrhythmia",country:{name:"United States of America"}}},{id:"64434",title:"Dr.",name:"Angkoon",middleName:null,surname:"Phinyomark",slug:"angkoon-phinyomark",fullName:"Angkoon Phinyomark",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/64434/images/2619_n.jpg",biography:"My name is Angkoon Phinyomark. I received a B.Eng. degree in Computer Engineering with First Class Honors in 2008 from Prince of Songkla University, Songkhla, Thailand, where I received a Ph.D. degree in Electrical Engineering. My research interests are primarily in the area of biomedical signal processing and classification notably EMG (electromyography signal), EOG (electrooculography signal), and EEG (electroencephalography signal), image analysis notably breast cancer analysis and optical coherence tomography, and rehabilitation engineering. I became a student member of IEEE in 2008. During October 2011-March 2012, I had worked at School of Computer Science and Electronic Engineering, University of Essex, Colchester, Essex, United Kingdom. In addition, during a B.Eng. I had been a visiting research student at Faculty of Computer Science, University of Murcia, Murcia, Spain for three months.\n\nI have published over 40 papers during 5 years in refereed journals, books, and conference proceedings in the areas of electro-physiological signals processing and classification, notably EMG and EOG signals, fractal analysis, wavelet analysis, texture analysis, feature extraction and machine learning algorithms, and assistive and rehabilitative devices. I have several computer programming language certificates, i.e. Sun Certified Programmer for the Java 2 Platform 1.4 (SCJP), Microsoft Certified Professional Developer, Web Developer (MCPD), Microsoft Certified Technology Specialist, .NET Framework 2.0 Web (MCTS). I am a Reviewer for several refereed journals and international conferences, such as IEEE Transactions on Biomedical Engineering, IEEE Transactions on Industrial Electronics, Optic Letters, Measurement Science Review, and also a member of the International Advisory Committee for 2012 IEEE Business Engineering and Industrial Applications and 2012 IEEE Symposium on Business, Engineering and Industrial Applications.",institutionString:null,institution:{name:"Joseph Fourier University",country:{name:"France"}}},{id:"55578",title:"Dr.",name:"Antonio",middleName:null,surname:"Jurado-Navas",slug:"antonio-jurado-navas",fullName:"Antonio Jurado-Navas",position:null,profilePictureURL:"https://mts.intechopen.com/storage/users/55578/images/4574_n.png",biography:"Antonio Jurado-Navas received the M.S. degree (2002) and the Ph.D. degree (2009) in Telecommunication Engineering, both from the University of Málaga (Spain). He first worked as a consultant at Vodafone-Spain. From 2004 to 2011, he was a Research Assistant with the Communications Engineering Department at the University of Málaga. In 2011, he became an Assistant Professor in the same department. From 2012 to 2015, he was with Ericsson Spain, where he was working on geo-location\ntools for third generation mobile networks. Since 2015, he is a Marie-Curie fellow at the Denmark Technical University. His current research interests include the areas of mobile communication systems and channel modeling in addition to atmospheric optical communications, adaptive optics and statistics",institutionString:null,institution:{name:"University of Malaga",country:{name:"Spain"}}}],filtersByRegion:[{group:"region",caption:"North America",value:1,count:5763},{group:"region",caption:"Middle and South America",value:2,count:5227},{group:"region",caption:"Africa",value:3,count:1717},{group:"region",caption:"Asia",value:4,count:10365},{group:"region",caption:"Australia and Oceania",value:5,count:897},{group:"region",caption:"Europe",value:6,count:15784}],offset:12,limit:12,total:118187},chapterEmbeded:{data:{}},editorApplication:{success:null,errors:{}},ofsBooks:{filterParams:{"amp;sort":"dateEndThirdStepPublish",hasNoEditors:"0"},books:[{type:"book",id:"8950",title:"Birds - Challenges and Opportunities for Business, Conservation and Research",subtitle:null,isOpenForSubmission:!0,hash:"404a05af45e47e43871f4a0b1bedc6fd",slug:null,bookSignature:"Dr. Heimo Juhani Mikkola",coverURL:"https://cdn.intechopen.com/books/images_new/8950.jpg",editedByType:null,editors:[{id:"144330",title:"Dr.",name:"Heimo",surname:"Mikkola",slug:"heimo-mikkola",fullName:"Heimo Mikkola"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8969",title:"Deserts and Desertification",subtitle:null,isOpenForSubmission:!0,hash:"4df95c7f295de7f6003e635d9a309fe9",slug:null,bookSignature:"Dr. Yajuan Zhu, Dr. Qinghong Luo and Dr. Yuguo Liu",coverURL:"https://cdn.intechopen.com/books/images_new/8969.jpg",editedByType:null,editors:[{id:"180427",title:"Dr.",name:"Yajuan",surname:"Zhu",slug:"yajuan-zhu",fullName:"Yajuan Zhu"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8977",title:"Protein Kinase - New Opportunities, Challenges and Future Perspectives",subtitle:null,isOpenForSubmission:!0,hash:"6d200cc031706a565b554fdb1c478901",slug:null,bookSignature:"Dr. Rajesh Kumar Singh",coverURL:"https://cdn.intechopen.com/books/images_new/8977.jpg",editedByType:null,editors:[{id:"329385",title:"Dr.",name:"Rajesh",surname:"Singh",slug:"rajesh-singh",fullName:"Rajesh Singh"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9615",title:"Chikungunya",subtitle:null,isOpenForSubmission:!0,hash:"c960d94a63867dd12a8ab15176a3ff06",slug:null,bookSignature:"Dr. Jean Engohang-Ndong",coverURL:"https://cdn.intechopen.com/books/images_new/9615.jpg",editedByType:null,editors:[{id:"180733",title:"Dr.",name:"Jean",surname:"Engohang-Ndong",slug:"jean-engohang-ndong",fullName:"Jean Engohang-Ndong"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9659",title:"Fibroblasts - Advances in Cancer, Autoimmunity and Inflammation",subtitle:null,isOpenForSubmission:!0,hash:"926fa6446f6befbd363fc74971a56de2",slug:null,bookSignature:"Ph.D. Mojca Frank Bertoncelj and Ms. Katja Lakota",coverURL:"https://cdn.intechopen.com/books/images_new/9659.jpg",editedByType:null,editors:[{id:"328755",title:"Ph.D.",name:"Mojca",surname:"Frank Bertoncelj",slug:"mojca-frank-bertoncelj",fullName:"Mojca Frank Bertoncelj"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9662",title:"Vegetation Index and Dynamics",subtitle:null,isOpenForSubmission:!0,hash:"0abf2a59ee63fc1ba4fb64d77c9b1be7",slug:null,bookSignature:"Dr. Eusebio Cano Carmona, Dr. Ricardo Quinto Canas, Dr. Ana Cano Ortiz and Dr. Carmelo Maria Musarella",coverURL:"https://cdn.intechopen.com/books/images_new/9662.jpg",editedByType:null,editors:[{id:"87846",title:"Dr.",name:"Eusebio",surname:"Cano Carmona",slug:"eusebio-cano-carmona",fullName:"Eusebio Cano Carmona"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9667",title:"Neuroimmunology",subtitle:null,isOpenForSubmission:!0,hash:"9cf0e8203ce088c0b84add014fd8d382",slug:null,bookSignature:"Prof. Robert Weissert",coverURL:"https://cdn.intechopen.com/books/images_new/9667.jpg",editedByType:null,editors:[{id:"79343",title:"Prof.",name:"Robert",surname:"Weissert",slug:"robert-weissert",fullName:"Robert Weissert"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9796",title:"Cancers of Childhood and Adolescence - Epidemiology, Diagnosis, Treatment and Prognosis",subtitle:null,isOpenForSubmission:!0,hash:"7c90c97b84629336aa5af2e9797f4cf2",slug:null,bookSignature:"Prof. Dariusz Borys",coverURL:"https://cdn.intechopen.com/books/images_new/9796.jpg",editedByType:null,editors:[{id:"91258",title:"Prof.",name:"Dariusz",surname:"Borys",slug:"dariusz-borys",fullName:"Dariusz Borys"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9808",title:"Contemporary Topics in Patient Safety - Volume 1",subtitle:null,isOpenForSubmission:!0,hash:"fb6371607c2c6c02c6a2af8892765aba",slug:null,bookSignature:"Dr. Stanislaw P. Stawicki, Michael S. S Firstenberg and Dr. Vikas Yellapu",coverURL:"https://cdn.intechopen.com/books/images_new/9808.jpg",editedByType:null,editors:[{id:"181694",title:"Dr.",name:"Stanislaw P.",surname:"Stawicki",slug:"stanislaw-p.-stawicki",fullName:"Stanislaw P. Stawicki"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9816",title:"Idiopathic Pulmonary Fibrosis",subtitle:null,isOpenForSubmission:!0,hash:"365bb9762ba33db2d07e677690af1772",slug:null,bookSignature:"Dr. Salim Surani and Dr. Venkat Rajasurya",coverURL:"https://cdn.intechopen.com/books/images_new/9816.jpg",editedByType:null,editors:[{id:"15654",title:"Dr.",name:"Salim",surname:"Surani",slug:"salim-surani",fullName:"Salim Surani"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10176",title:"Microgrids and Local Energy Systems",subtitle:null,isOpenForSubmission:!0,hash:"c32b4a5351a88f263074b0d0ca813a9c",slug:null,bookSignature:"Prof. Nick Jenkins",coverURL:"https://cdn.intechopen.com/books/images_new/10176.jpg",editedByType:null,editors:[{id:"55219",title:"Prof.",name:"Nick",surname:"Jenkins",slug:"nick-jenkins",fullName:"Nick Jenkins"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10218",title:"Flagellar Motility in Cells",subtitle:null,isOpenForSubmission:!0,hash:"5fcc15570365a82d9f2c4816f4e0ee2e",slug:null,bookSignature:"Prof. Yusuf Bozkurt",coverURL:"https://cdn.intechopen.com/books/images_new/10218.jpg",editedByType:null,editors:[{id:"90846",title:"Prof.",name:"Yusuf",surname:"Bozkurt",slug:"yusuf-bozkurt",fullName:"Yusuf Bozkurt"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],filtersByTopic:[{group:"topic",caption:"Agricultural and Biological Sciences",value:5,count:14},{group:"topic",caption:"Biochemistry, Genetics and Molecular Biology",value:6,count:3},{group:"topic",caption:"Business, Management and Economics",value:7,count:1},{group:"topic",caption:"Chemistry",value:8,count:6},{group:"topic",caption:"Computer and Information Science",value:9,count:7},{group:"topic",caption:"Earth and Planetary Sciences",value:10,count:7},{group:"topic",caption:"Engineering",value:11,count:15},{group:"topic",caption:"Environmental Sciences",value:12,count:2},{group:"topic",caption:"Immunology and Microbiology",value:13,count:3},{group:"topic",caption:"Materials Science",value:14,count:5},{group:"topic",caption:"Mathematics",value:15,count:1},{group:"topic",caption:"Medicine",value:16,count:28},{group:"topic",caption:"Neuroscience",value:18,count:1},{group:"topic",caption:"Pharmacology, Toxicology and Pharmaceutical Science",value:19,count:2},{group:"topic",caption:"Physics",value:20,count:2},{group:"topic",caption:"Psychology",value:21,count:4},{group:"topic",caption:"Social Sciences",value:23,count:2},{group:"topic",caption:"Technology",value:24,count:1},{group:"topic",caption:"Veterinary Medicine and Science",value:25,count:1}],offset:12,limit:12,total:105},popularBooks:{featuredBooks:[{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8985",title:"Natural Resources Management and Biological Sciences",subtitle:null,isOpenForSubmission:!1,hash:"5c2e219a6c021a40b5a20c041dea88c4",slug:"natural-resources-management-and-biological-sciences",bookSignature:"Edward R. Rhodes and Humood Naser",coverURL:"https://cdn.intechopen.com/books/images_new/8985.jpg",editors:[{id:"280886",title:"Prof.",name:"Edward R",middleName:null,surname:"Rhodes",slug:"edward-r-rhodes",fullName:"Edward R Rhodes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9027",title:"Human Blood Group Systems and Haemoglobinopathies",subtitle:null,isOpenForSubmission:!1,hash:"d00d8e40b11cfb2547d1122866531c7e",slug:"human-blood-group-systems-and-haemoglobinopathies",bookSignature:"Osaro Erhabor and Anjana Munshi",coverURL:"https://cdn.intechopen.com/books/images_new/9027.jpg",editors:[{id:"35140",title:null,name:"Osaro",middleName:null,surname:"Erhabor",slug:"osaro-erhabor",fullName:"Osaro Erhabor"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7841",title:"New Insights Into Metabolic Syndrome",subtitle:null,isOpenForSubmission:!1,hash:"ef5accfac9772b9e2c9eff884f085510",slug:"new-insights-into-metabolic-syndrome",bookSignature:"Akikazu Takada",coverURL:"https://cdn.intechopen.com/books/images_new/7841.jpg",editors:[{id:"248459",title:"Dr.",name:"Akikazu",middleName:null,surname:"Takada",slug:"akikazu-takada",fullName:"Akikazu Takada"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8558",title:"Aerodynamics",subtitle:null,isOpenForSubmission:!1,hash:"db7263fc198dfb539073ba0260a7f1aa",slug:"aerodynamics",bookSignature:"Mofid Gorji-Bandpy and Aly-Mousaad Aly",coverURL:"https://cdn.intechopen.com/books/images_new/8558.jpg",editors:[{id:"35542",title:"Prof.",name:"Mofid",middleName:null,surname:"Gorji-Bandpy",slug:"mofid-gorji-bandpy",fullName:"Mofid Gorji-Bandpy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9668",title:"Chemistry and Biochemistry of Winemaking, Wine Stabilization and Aging",subtitle:null,isOpenForSubmission:!1,hash:"c5484276a314628acf21ec1bdc3a86b9",slug:"chemistry-and-biochemistry-of-winemaking-wine-stabilization-and-aging",bookSignature:"Fernanda Cosme, Fernando M. Nunes and Luís Filipe-Ribeiro",coverURL:"https://cdn.intechopen.com/books/images_new/9668.jpg",editors:[{id:"186819",title:"Prof.",name:"Fernanda",middleName:null,surname:"Cosme",slug:"fernanda-cosme",fullName:"Fernanda Cosme"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7847",title:"Medical Toxicology",subtitle:null,isOpenForSubmission:!1,hash:"db9b65bea093de17a0855a1b27046247",slug:"medical-toxicology",bookSignature:"Pınar Erkekoglu and Tomohisa Ogawa",coverURL:"https://cdn.intechopen.com/books/images_new/7847.jpg",editors:[{id:"109978",title:"Prof.",name:"Pınar",middleName:null,surname:"Erkekoglu",slug:"pinar-erkekoglu",fullName:"Pınar Erkekoglu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8620",title:"Mining Techniques",subtitle:"Past, Present and Future",isOpenForSubmission:!1,hash:"b65658f81d14e9e57e49377869d3a575",slug:"mining-techniques-past-present-and-future",bookSignature:"Abhay Soni",coverURL:"https://cdn.intechopen.com/books/images_new/8620.jpg",editors:[{id:"271093",title:"Dr.",name:"Abhay",middleName:null,surname:"Soni",slug:"abhay-soni",fullName:"Abhay Soni"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9660",title:"Inland Waters",subtitle:"Dynamics and Ecology",isOpenForSubmission:!1,hash:"975c26819ceb11a926793bc2adc62bd6",slug:"inland-waters-dynamics-and-ecology",bookSignature:"Adam Devlin, Jiayi Pan and Mohammad Manjur Shah",coverURL:"https://cdn.intechopen.com/books/images_new/9660.jpg",editors:[{id:"280757",title:"Dr.",name:"Adam",middleName:"Thomas",surname:"Devlin",slug:"adam-devlin",fullName:"Adam Devlin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9122",title:"Cosmetic Surgery",subtitle:null,isOpenForSubmission:!1,hash:"207026ca4a4125e17038e770d00ee152",slug:"cosmetic-surgery",bookSignature:"Yueh-Bih Tang",coverURL:"https://cdn.intechopen.com/books/images_new/9122.jpg",editors:[{id:"202122",title:"Prof.",name:"Yueh-Bih",middleName:null,surname:"Tang",slug:"yueh-bih-tang",fullName:"Yueh-Bih Tang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9043",title:"Parenting",subtitle:"Studies by an Ecocultural and Transactional Perspective",isOpenForSubmission:!1,hash:"6d21066c7438e459e4c6fb13217a5c8c",slug:"parenting-studies-by-an-ecocultural-and-transactional-perspective",bookSignature:"Loredana Benedetto and Massimo Ingrassia",coverURL:"https://cdn.intechopen.com/books/images_new/9043.jpg",editors:[{id:"193200",title:"Prof.",name:"Loredana",middleName:null,surname:"Benedetto",slug:"loredana-benedetto",fullName:"Loredana Benedetto"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9731",title:"Oxidoreductase",subtitle:null,isOpenForSubmission:!1,hash:"852e6f862c85fc3adecdbaf822e64e6e",slug:"oxidoreductase",bookSignature:"Mahmoud Ahmed Mansour",coverURL:"https://cdn.intechopen.com/books/images_new/9731.jpg",editors:[{id:"224662",title:"Prof.",name:"Mahmoud Ahmed",middleName:null,surname:"Mansour",slug:"mahmoud-ahmed-mansour",fullName:"Mahmoud Ahmed Mansour"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:12,limit:12,total:5221},hotBookTopics:{hotBooks:[],offset:0,limit:12,total:null},publish:{},publishingProposal:{success:null,errors:{}},books:{featuredBooks:[{type:"book",id:"9385",title:"Renewable Energy",subtitle:"Technologies and Applications",isOpenForSubmission:!1,hash:"a6b446d19166f17f313008e6c056f3d8",slug:"renewable-energy-technologies-and-applications",bookSignature:"Tolga Taner, Archana Tiwari and Taha Selim Ustun",coverURL:"https://cdn.intechopen.com/books/images_new/9385.jpg",editors:[{id:"197240",title:"Associate Prof.",name:"Tolga",middleName:null,surname:"Taner",slug:"tolga-taner",fullName:"Tolga Taner"}],equalEditorOne:{id:"186791",title:"Dr.",name:"Archana",middleName:null,surname:"Tiwari",slug:"archana-tiwari",fullName:"Archana Tiwari",profilePictureURL:"https://mts.intechopen.com/storage/users/186791/images/system/186791.jpg",biography:"Dr. Archana Tiwari is Associate Professor at Amity University, India. Her research interests include renewable sources of energy from microalgae and further utilizing the residual biomass for the generation of value-added products, bioremediation through microalgae and microbial consortium, antioxidative enzymes and stress, and nutraceuticals from microalgae. She has been working on algal biotechnology for the last two decades. She has published her research in many international journals and has authored many books and chapters with renowned publishing houses. She has also delivered talks as an invited speaker at many national and international conferences. Dr. Tiwari is the recipient of several awards including Researcher of the Year and Distinguished Scientist.",institutionString:"Amity University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"3",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Amity University",institutionURL:null,country:{name:"India"}}},equalEditorTwo:{id:"197609",title:"Prof.",name:"Taha Selim",middleName:null,surname:"Ustun",slug:"taha-selim-ustun",fullName:"Taha Selim Ustun",profilePictureURL:"https://mts.intechopen.com/storage/users/197609/images/system/197609.jpeg",biography:"Dr. Taha Selim Ustun received a Ph.D. in Electrical Engineering from Victoria University, Melbourne, Australia. He is a researcher with the Fukushima Renewable Energy Institute, AIST (FREA), where he leads the Smart Grid Cybersecurity Laboratory. Prior to that, he was a faculty member with the School of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA. His current research interests include power systems protection, communication in power networks, distributed generation, microgrids, electric vehicle integration, and cybersecurity in smart grids. He serves on the editorial boards of IEEE Access, IEEE Transactions on Industrial Informatics, Energies, Electronics, Electricity, World Electric Vehicle and Information journals. Dr. Ustun is a member of the IEEE 2004 and 2800, IEC Renewable Energy Management WG 8, and IEC TC 57 WG17. He has been invited to run specialist courses in Africa, India, and China. He has delivered talks for the Qatar Foundation, the World Energy Council, the Waterloo Global Science Initiative, and the European Union Energy Initiative (EUEI). His research has attracted funding from prestigious programs in Japan, Australia, the European Union, and North America.",institutionString:"Fukushima Renewable Energy Institute, AIST (FREA)",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"National Institute of Advanced Industrial Science and Technology",institutionURL:null,country:{name:"Japan"}}},equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8985",title:"Natural Resources Management and Biological Sciences",subtitle:null,isOpenForSubmission:!1,hash:"5c2e219a6c021a40b5a20c041dea88c4",slug:"natural-resources-management-and-biological-sciences",bookSignature:"Edward R. Rhodes and Humood Naser",coverURL:"https://cdn.intechopen.com/books/images_new/8985.jpg",editors:[{id:"280886",title:"Prof.",name:"Edward R",middleName:null,surname:"Rhodes",slug:"edward-r-rhodes",fullName:"Edward R Rhodes"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9027",title:"Human Blood Group Systems and Haemoglobinopathies",subtitle:null,isOpenForSubmission:!1,hash:"d00d8e40b11cfb2547d1122866531c7e",slug:"human-blood-group-systems-and-haemoglobinopathies",bookSignature:"Osaro Erhabor and Anjana Munshi",coverURL:"https://cdn.intechopen.com/books/images_new/9027.jpg",editors:[{id:"35140",title:null,name:"Osaro",middleName:null,surname:"Erhabor",slug:"osaro-erhabor",fullName:"Osaro Erhabor"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7841",title:"New Insights Into Metabolic Syndrome",subtitle:null,isOpenForSubmission:!1,hash:"ef5accfac9772b9e2c9eff884f085510",slug:"new-insights-into-metabolic-syndrome",bookSignature:"Akikazu Takada",coverURL:"https://cdn.intechopen.com/books/images_new/7841.jpg",editors:[{id:"248459",title:"Dr.",name:"Akikazu",middleName:null,surname:"Takada",slug:"akikazu-takada",fullName:"Akikazu Takada"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8558",title:"Aerodynamics",subtitle:null,isOpenForSubmission:!1,hash:"db7263fc198dfb539073ba0260a7f1aa",slug:"aerodynamics",bookSignature:"Mofid Gorji-Bandpy and Aly-Mousaad Aly",coverURL:"https://cdn.intechopen.com/books/images_new/8558.jpg",editors:[{id:"35542",title:"Prof.",name:"Mofid",middleName:null,surname:"Gorji-Bandpy",slug:"mofid-gorji-bandpy",fullName:"Mofid Gorji-Bandpy"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9668",title:"Chemistry and Biochemistry of Winemaking, Wine Stabilization and Aging",subtitle:null,isOpenForSubmission:!1,hash:"c5484276a314628acf21ec1bdc3a86b9",slug:"chemistry-and-biochemistry-of-winemaking-wine-stabilization-and-aging",bookSignature:"Fernanda Cosme, Fernando M. Nunes and Luís Filipe-Ribeiro",coverURL:"https://cdn.intechopen.com/books/images_new/9668.jpg",editors:[{id:"186819",title:"Prof.",name:"Fernanda",middleName:null,surname:"Cosme",slug:"fernanda-cosme",fullName:"Fernanda Cosme"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"7847",title:"Medical Toxicology",subtitle:null,isOpenForSubmission:!1,hash:"db9b65bea093de17a0855a1b27046247",slug:"medical-toxicology",bookSignature:"Pınar Erkekoglu and Tomohisa Ogawa",coverURL:"https://cdn.intechopen.com/books/images_new/7847.jpg",editors:[{id:"109978",title:"Prof.",name:"Pınar",middleName:null,surname:"Erkekoglu",slug:"pinar-erkekoglu",fullName:"Pınar Erkekoglu"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"8620",title:"Mining Techniques",subtitle:"Past, Present and Future",isOpenForSubmission:!1,hash:"b65658f81d14e9e57e49377869d3a575",slug:"mining-techniques-past-present-and-future",bookSignature:"Abhay Soni",coverURL:"https://cdn.intechopen.com/books/images_new/8620.jpg",editors:[{id:"271093",title:"Dr.",name:"Abhay",middleName:null,surname:"Soni",slug:"abhay-soni",fullName:"Abhay Soni"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9660",title:"Inland Waters",subtitle:"Dynamics and Ecology",isOpenForSubmission:!1,hash:"975c26819ceb11a926793bc2adc62bd6",slug:"inland-waters-dynamics-and-ecology",bookSignature:"Adam Devlin, Jiayi Pan and Mohammad Manjur Shah",coverURL:"https://cdn.intechopen.com/books/images_new/9660.jpg",editors:[{id:"280757",title:"Dr.",name:"Adam",middleName:"Thomas",surname:"Devlin",slug:"adam-devlin",fullName:"Adam Devlin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}},{type:"book",id:"9122",title:"Cosmetic Surgery",subtitle:null,isOpenForSubmission:!1,hash:"207026ca4a4125e17038e770d00ee152",slug:"cosmetic-surgery",bookSignature:"Yueh-Bih Tang",coverURL:"https://cdn.intechopen.com/books/images_new/9122.jpg",editors:[{id:"202122",title:"Prof.",name:"Yueh-Bih",middleName:null,surname:"Tang",slug:"yueh-bih-tang",fullName:"Yueh-Bih Tang"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],latestBooks:[{type:"book",id:"9550",title:"Entrepreneurship",subtitle:"Contemporary Issues",isOpenForSubmission:!1,hash:"9b4ac1ee5b743abf6f88495452b1e5e7",slug:"entrepreneurship-contemporary-issues",bookSignature:"Mladen Turuk",coverURL:"https://cdn.intechopen.com/books/images_new/9550.jpg",editedByType:"Edited by",editors:[{id:"319755",title:"Prof.",name:"Mladen",middleName:null,surname:"Turuk",slug:"mladen-turuk",fullName:"Mladen Turuk"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10065",title:"Wavelet Theory",subtitle:null,isOpenForSubmission:!1,hash:"d8868e332169597ba2182d9b004d60de",slug:"wavelet-theory",bookSignature:"Somayeh Mohammady",coverURL:"https://cdn.intechopen.com/books/images_new/10065.jpg",editedByType:"Edited by",editors:[{id:"109280",title:"Dr.",name:"Somayeh",middleName:null,surname:"Mohammady",slug:"somayeh-mohammady",fullName:"Somayeh Mohammady"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9313",title:"Clay Science and Technology",subtitle:null,isOpenForSubmission:!1,hash:"6fa7e70396ff10620e032bb6cfa6fb72",slug:"clay-science-and-technology",bookSignature:"Gustavo Morari Do Nascimento",coverURL:"https://cdn.intechopen.com/books/images_new/9313.jpg",editedByType:"Edited by",editors:[{id:"7153",title:"Prof.",name:"Gustavo",middleName:null,surname:"Morari Do Nascimento",slug:"gustavo-morari-do-nascimento",fullName:"Gustavo Morari Do Nascimento"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9888",title:"Nuclear Power Plants",subtitle:"The Processes from the Cradle to the Grave",isOpenForSubmission:!1,hash:"c2c8773e586f62155ab8221ebb72a849",slug:"nuclear-power-plants-the-processes-from-the-cradle-to-the-grave",bookSignature:"Nasser Awwad",coverURL:"https://cdn.intechopen.com/books/images_new/9888.jpg",editedByType:"Edited by",editors:[{id:"145209",title:"Prof.",name:"Nasser",middleName:"S",surname:"Awwad",slug:"nasser-awwad",fullName:"Nasser Awwad"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8098",title:"Resources of Water",subtitle:null,isOpenForSubmission:!1,hash:"d251652996624d932ef7b8ed62cf7cfc",slug:"resources-of-water",bookSignature:"Prathna Thanjavur Chandrasekaran, Muhammad Salik Javaid, Aftab Sadiq",coverURL:"https://cdn.intechopen.com/books/images_new/8098.jpg",editedByType:"Edited by",editors:[{id:"167917",title:"Dr.",name:"Prathna",middleName:null,surname:"Thanjavur Chandrasekaran",slug:"prathna-thanjavur-chandrasekaran",fullName:"Prathna Thanjavur Chandrasekaran"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9644",title:"Glaciers and the Polar Environment",subtitle:null,isOpenForSubmission:!1,hash:"e8cfdc161794e3753ced54e6ff30873b",slug:"glaciers-and-the-polar-environment",bookSignature:"Masaki Kanao, Danilo Godone and Niccolò Dematteis",coverURL:"https://cdn.intechopen.com/books/images_new/9644.jpg",editedByType:"Edited by",editors:[{id:"51959",title:"Dr.",name:"Masaki",middleName:null,surname:"Kanao",slug:"masaki-kanao",fullName:"Masaki Kanao"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"10432",title:"Casting Processes and Modelling of Metallic Materials",subtitle:null,isOpenForSubmission:!1,hash:"2c5c9df938666bf5d1797727db203a6d",slug:"casting-processes-and-modelling-of-metallic-materials",bookSignature:"Zakaria Abdallah and Nada Aldoumani",coverURL:"https://cdn.intechopen.com/books/images_new/10432.jpg",editedByType:"Edited by",editors:[{id:"201670",title:"Dr.",name:"Zak",middleName:null,surname:"Abdallah",slug:"zak-abdallah",fullName:"Zak Abdallah"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9671",title:"Macrophages",subtitle:null,isOpenForSubmission:!1,hash:"03b00fdc5f24b71d1ecdfd75076bfde6",slug:"macrophages",bookSignature:"Hridayesh Prakash",coverURL:"https://cdn.intechopen.com/books/images_new/9671.jpg",editedByType:"Edited by",editors:[{id:"287184",title:"Dr.",name:"Hridayesh",middleName:null,surname:"Prakash",slug:"hridayesh-prakash",fullName:"Hridayesh Prakash"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8415",title:"Extremophilic Microbes and Metabolites",subtitle:"Diversity, Bioprospecting and Biotechnological Applications",isOpenForSubmission:!1,hash:"93e0321bc93b89ff73730157738f8f97",slug:"extremophilic-microbes-and-metabolites-diversity-bioprospecting-and-biotechnological-applications",bookSignature:"Afef Najjari, Ameur Cherif, Haïtham Sghaier and Hadda Imene Ouzari",coverURL:"https://cdn.intechopen.com/books/images_new/8415.jpg",editedByType:"Edited by",editors:[{id:"196823",title:"Dr.",name:"Afef",middleName:null,surname:"Najjari",slug:"afef-najjari",fullName:"Afef Najjari"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"9731",title:"Oxidoreductase",subtitle:null,isOpenForSubmission:!1,hash:"852e6f862c85fc3adecdbaf822e64e6e",slug:"oxidoreductase",bookSignature:"Mahmoud Ahmed Mansour",coverURL:"https://cdn.intechopen.com/books/images_new/9731.jpg",editedByType:"Edited by",editors:[{id:"224662",title:"Prof.",name:"Mahmoud Ahmed",middleName:null,surname:"Mansour",slug:"mahmoud-ahmed-mansour",fullName:"Mahmoud Ahmed Mansour"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},subject:{topic:{id:"691",title:"Biosignaling",slug:"biosignaling",parent:{title:"Biomedical Engineering",slug:"engineering-biomedical-engineering"},numberOfBooks:0,numberOfAuthorsAndEditors:0,numberOfWosCitations:0,numberOfCrossrefCitations:0,numberOfDimensionsCitations:0,videoUrl:null,fallbackUrl:null,description:null},booksByTopicFilter:{topicSlug:"biosignaling",sort:"-publishedDate",limit:12,offset:0},booksByTopicCollection:[],booksByTopicTotal:0,mostCitedChapters:[],mostDownloadedChaptersLast30Days:[],onlineFirstChaptersFilter:{topicSlug:"biosignaling",limit:3,offset:0},onlineFirstChaptersCollection:[],onlineFirstChaptersTotal:0},preDownload:{success:null,errors:{}},aboutIntechopen:{},privacyPolicy:{},peerReviewing:{},howOpenAccessPublishingWithIntechopenWorks:{},sponsorshipBooks:{sponsorshipBooks:[{type:"book",id:"10176",title:"Microgrids and Local Energy Systems",subtitle:null,isOpenForSubmission:!0,hash:"c32b4a5351a88f263074b0d0ca813a9c",slug:null,bookSignature:"Prof. Nick Jenkins",coverURL:"https://cdn.intechopen.com/books/images_new/10176.jpg",editedByType:null,editors:[{id:"55219",title:"Prof.",name:"Nick",middleName:null,surname:"Jenkins",slug:"nick-jenkins",fullName:"Nick Jenkins"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter"}}],offset:8,limit:8,total:1},route:{name:"profile.detail",path:"/profiles/24568/fakir-mohamed",hash:"",query:{},params:{id:"24568",slug:"fakir-mohamed"},fullPath:"/profiles/24568/fakir-mohamed",meta:{},from:{name:null,path:"/",hash:"",query:{},params:{},fullPath:"/",meta:{}}}},function(){var e;(e=document.currentScript||document.scripts[document.scripts.length-1]).parentNode.removeChild(e)}()