{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,13]],"date-time":"2025-05-13T16:14:14Z","timestamp":1747152854306,"version":"3.40.5"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030430696"},{"type":"electronic","value":"9783030430702"}],"license":[{"start":{"date-parts":[[2020,6,21]],"date-time":"2020-06-21T00:00:00Z","timestamp":1592697600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,21]],"date-time":"2020-06-21T00:00:00Z","timestamp":1592697600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-43070-2_29","type":"book-chapter","created":{"date-parts":[[2020,6,20]],"date-time":"2020-06-20T11:03:02Z","timestamp":1592650982000},"page":"675-709","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Development and Operation Analysis of Spectrum Monitoring Subsystem 2.4\u20132.5\u00a0GHz Range"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6140-3351","authenticated-orcid":false,"given":"Zhengbing","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4055-1494","authenticated-orcid":false,"given":"Volodymyr","family":"Buriachok","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9390-2980","authenticated-orcid":false,"given":"Ivan","family":"Bogachuk","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9349-7946","authenticated-orcid":false,"given":"Volodymyr","family":"Sokolov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2686-3854","authenticated-orcid":false,"given":"Dmytro","family":"Ageyev","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,21]]},"reference":[{"issue":"4","key":"29_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijcnis.2019.04.01","volume":"11","author":"D Johnson","year":"2019","unstructured":"Johnson D, Ketel M (2019) IoT: application protocols and security. Int J Comput Netw Inf Secur 11(4):1\u20138. \nhttps:\/\/doi.org\/10.5815\/ijcnis.2019.04.01","journal-title":"Int J Comput Netw Inf Secur"},{"issue":"6","key":"29_CR2","doi-asserted-by":"publisher","first-page":"15","DOI":"10.5815\/ijwmt.2018.06.02","volume":"8","author":"M Noman Riaz","year":"2018","unstructured":"Noman Riaz M, Buriro A, Mahboob A (2018) Classification of attacks on wireless sensor networks: a survey. Int J Wirel Microw Technol 8(6):15\u201339. \nhttps:\/\/doi.org\/10.5815\/ijwmt.2018.06.02","journal-title":"Int J Wirel Microw Technol"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Radivilova T, Hassan HA (2017) Test for penetration in Wi-Fi network: attacks on WPA2-PSK and WPA2-enterprise. In: 2017 international conference on information and telecommunication technologies and radio electronics (UkrMiCo). IEEE, pp 1\u20134","DOI":"10.1109\/UkrMiCo.2017.8095429"},{"key":"29_CR4","doi-asserted-by":"publisher","unstructured":"Dobrynin I et al (2018) Use of approaches to the methodology of factor analysis of information risks for the quantitative assessment of information risks based on the formation of cause-and-effect links. In: Proceedings of the 2018 international scientific-practical conference problems of infocommunications. Science and technology (PIC S&T). IEEE, pp 229\u2013232. \nhttps:\/\/doi.org\/10.1109\/infocommst.2018.8632022","DOI":"10.1109\/infocommst.2018.8632022"},{"key":"29_CR5","doi-asserted-by":"publisher","unstructured":"Ageyev D et al (2018) Provision security in SDN\/NFV. In: 2018 14th international conference on advanced trends in radioelecrtronics, telecommunications and computer engineering (TCSET). IEEE, pp 506\u2013509. \nhttps:\/\/doi.org\/10.1109\/tcset.2018.8336252","DOI":"10.1109\/tcset.2018.8336252"},{"issue":"14","key":"29_CR6","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1615\/TelecomRadEng.v75.i14.10","volume":"75","author":"DV Ageyev","year":"2016","unstructured":"Ageyev DV, Salah MT (2016) Parametric synthesis of overlay networks with self-similar traffic. Telecommun Radio Eng (English translation of Elektrosvyaz and Radiotekhnika) 75(14):1231\u20131241","journal-title":"Telecommun Radio Eng (English translation of Elektrosvyaz and Radiotekhnika)"},{"key":"29_CR7","doi-asserted-by":"publisher","unstructured":"Kirichenko L, Radivilova T, Bulakh V (2018) Classification of fractal time series using recurrence plots. In: 2018 international scientific-practical conference problems of infocommunications. Science and technology (PIC S&T). IEEE, pp 719\u2013724. \nhttps:\/\/doi.org\/10.1109\/infocommst.2018.8632010","DOI":"10.1109\/infocommst.2018.8632010"},{"issue":"1","key":"29_CR8","first-page":"27","volume":"64","author":"YI Daradkeh","year":"2018","unstructured":"Daradkeh YI, Kirichenko L, Radivilova T (2018) Development of QoS methods in the information networks with fractal traffic. Int J Electron Telecommun 64(1):27\u201332","journal-title":"Int J Electron Telecommun"},{"issue":"4","key":"29_CR9","doi-asserted-by":"publisher","first-page":"40","DOI":"10.5815\/ijwmt.2018.04.03","volume":"8","author":"M Noman Riaz","year":"2018","unstructured":"Noman Riaz M (2018) Clustering algorithms of wireless sensor networks: a survey. Int J Wirel Microw Technol 8(4):40\u201353. \nhttps:\/\/doi.org\/10.5815\/ijwmt.2018.04.03","journal-title":"Int J Wirel Microw Technol"},{"issue":"9","key":"29_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijcnis.2018.09.01","volume":"10","author":"I Kasim Ibraheem","year":"2018","unstructured":"Kasim Ibraheem I, Al-Hussainy AA-H (2018) A multi QoS genetic-based adaptive routing in wireless mesh networks with Pareto solutions. Int J Comput Netw Inf Secur 10(9):1\u20139. \nhttps:\/\/doi.org\/10.5815\/ijcnis.2018.09.01","journal-title":"Int J Comput Netw Inf Secur"},{"issue":"6","key":"29_CR11","doi-asserted-by":"publisher","first-page":"44","DOI":"10.5815\/ijitcs.2016.06.06","volume":"8","author":"R Saini","year":"2016","unstructured":"Saini R, Khurana SS (2016) Deployment of coordinated multiple sensors to detect stealth man-in-the-middle attack in WLAN. Int J Inf Technol Comput Sci 8(6):44\u201351. \nhttps:\/\/doi.org\/10.5815\/ijitcs.2016.06.06","journal-title":"Int J Inf Technol Comput Sci"},{"issue":"4","key":"29_CR12","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5815\/ijitcs.2018.04.04","volume":"10","author":"AP Abidoye","year":"2018","unstructured":"Abidoye AP (2018) Energy efficient routing protocol for maximum lifetime in wireless sensor networks. Int J Inf Technol Comput Sci 10(4):33\u201345. \nhttps:\/\/doi.org\/10.5815\/ijitcs.2018.04.04","journal-title":"Int J Inf Technol Comput Sci"},{"key":"29_CR13","doi-asserted-by":"publisher","unstructured":"Chandrappa S, Dharmanna L, Shyama Srivatsa Bhatta UV, Sudeeksha Chiploonkar M, Suraksha MN, Thrupthi S (2017) Design and development of IoT device to measure quality of water. Int J Modern Educ Comput Sci 9(4):50\u201356. \nhttps:\/\/doi.org\/10.5815\/ijmecs.2017.04.06","DOI":"10.5815\/ijmecs.2017.04.06"},{"issue":"5","key":"29_CR14","doi-asserted-by":"publisher","first-page":"45","DOI":"10.5815\/ijeme.2017.05.05","volume":"7","author":"S Chandrappa","year":"2017","unstructured":"Chandrappa S, Dharmanna L, Poojary SV, Meghana NU (2017) Automatic control of railway gates and destination notification system using internet of things (IoT). Int J Educ Manag Eng 7(5):45\u201355. \nhttps:\/\/doi.org\/10.5815\/ijeme.2017.05.05","journal-title":"Int J Educ Manag Eng"},{"issue":"6","key":"29_CR15","doi-asserted-by":"publisher","first-page":"24","DOI":"10.5815\/ijeme.2018.06.03","volume":"8","author":"GR Alakbarov","year":"2018","unstructured":"Alakbarov GR, Hashimov MA (2018) Application and security issues of internet of things in oil-gas industry. Int J Educ Manag Eng 8(6):24\u201336. \nhttps:\/\/doi.org\/10.5815\/ijeme.2018.06.03","journal-title":"Int J Educ Manag Eng"},{"issue":"6","key":"29_CR16","doi-asserted-by":"publisher","first-page":"55","DOI":"10.5815\/ijem.2018.06.05","volume":"8","author":"UB Mahadevaswamy","year":"2018","unstructured":"Mahadevaswamy UB (2018) Automatic IoT based plant monitoring and watering system using Raspberry Pi. Int J Eng Manuf 8(6):55\u201367. \nhttps:\/\/doi.org\/10.5815\/ijem.2018.06.05","journal-title":"Int J Eng Manuf"},{"key":"29_CR17","doi-asserted-by":"publisher","unstructured":"Karakaya A, Akleylek S (2018) A survey on security threats and authentication approaches in wireless sensor networks. In: 6th international symposium on digital forensic and security, Antalya, Mar 2018, pp 1\u20134. \nhttps:\/\/doi.org\/10.1109\/isdfs.2018.8355381","DOI":"10.1109\/isdfs.2018.8355381"},{"key":"29_CR18","doi-asserted-by":"publisher","unstructured":"Astapenya VM, Sokolov VY (2017) Experimental evaluation of the shading effect of accelerating lens in azimuth plane. In: 11th international conference on antenna theory and techniques, Kyiv, May 2017, pp 388\u2013390. \nhttps:\/\/doi.org\/10.1109\/icatt.2017.7972671","DOI":"10.1109\/icatt.2017.7972671"},{"key":"29_CR19","doi-asserted-by":"publisher","unstructured":"Chatfield B, Haddad RJ (2017) RSSI-based spoofing detection in smart grid IEEE 802.11 home area networks. In: IEEE power & energy society innovative smart grid technologies conference, Washington, 2017, pp 1\u20135. \nhttps:\/\/doi.org\/10.1109\/isgt.2017.8086064","DOI":"10.1109\/isgt.2017.8086064"},{"key":"29_CR20","doi-asserted-by":"publisher","unstructured":"Sokolov V, Carlsson A, Kuzminykh I (2017) Scheme for dynamic channel allocation with interference reduction in wireless sensor network. In: 4th international scientific-practical conference problems of infocommunications. Science and technology, Kharkiv, Oct 2017, pp 564\u2013568. \nhttps:\/\/doi.org\/10.1109\/infocommst.2017.8246463","DOI":"10.1109\/infocommst.2017.8246463"},{"key":"29_CR21","doi-asserted-by":"publisher","unstructured":"Kuzminykh I, Carlsson A, Yevdokymenko M, Sokolov V (2019) Investigation of the IoT device lifetime with secure data transmission. In: Galinina O, Andreev S, Balandin S, Koucheryavy Y (eds) Internet of things, smart spaces, and next generation networks and systems. NEW2AN 2019, ruSMART 2019. Lecture notes in computer science, vol 11660. Springer, Cham, pp 16\u201327. \nhttps:\/\/doi.org\/10.1007\/978-3-030-30859-9_2","DOI":"10.1007\/978-3-030-30859-9_2"},{"issue":"10","key":"29_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijisa.2014.10.01","volume":"6","author":"S Chakkor","year":"2014","unstructured":"Chakkor S, Cheikh EA, Baghouri M, Hajraoui A (2014) Efficiency evaluation metrics for wireless intelligent sensors applications. Int J Intell Syst Appl 6(10):1\u201310. \nhttps:\/\/doi.org\/10.5815\/ijisa.2014.10.01","journal-title":"Int J Intell Syst Appl"},{"key":"29_CR23","unstructured":"Pololu Corporation (2015) Pololu Wixel user\u2019s guide. \nhttps:\/\/www.pololu.com\/docs\/pdf\/0J46\/wixel.pdf\n\n. Accessed 15 Oct 2019"},{"key":"29_CR24","unstructured":"Python Software Foundation (2018) Python 3.6.6 Documentation. \nhttps:\/\/docs.python.org\/3\/download.html\n\n. Accessed 15 Oct 2019"},{"key":"29_CR25","unstructured":"Remington J (2011) Spectrum analyzer app code. \nhttps:\/\/forum.pololu.com\/t\/spectrum-analyzer-app-code\/3394\n\n. Accessed 15 Oct 2019"},{"key":"29_CR26","doi-asserted-by":"publisher","unstructured":"Bogachuk I, Sokolov V, Buriachok V (2018) Monitoring subsystem for wireless systems based on miniature spectrum analyzers. In: 5th international scientific and practical conference problems of infocommunications. Science and technology, Kharkiv Oct 2018, pp 581\u2013585. \nhttps:\/\/doi.org\/10.1109\/infocommst.2018.8632151","DOI":"10.1109\/infocommst.2018.8632151"},{"issue":"4","key":"29_CR27","doi-asserted-by":"publisher","first-page":"980","DOI":"10.1016\/j.matcom.2008.02.016","volume":"79","author":"N Kryvinska","year":"2008","unstructured":"Kryvinska N (2008) An analytical approach for the modeling of real-time services over IP network. Math Comput Simul 79(4):980\u2013990. \nhttps:\/\/doi.org\/10.1016\/j.matcom.2008.02.016","journal-title":"Math Comput Simul"},{"issue":"2","key":"29_CR28","doi-asserted-by":"publisher","first-page":"61","DOI":"10.5815\/ijisa.2014.02.08","volume":"6","author":"LO Babatope","year":"2014","unstructured":"Babatope LO, Babatunde L, Ayobami I (2014) Strategic sensor placement for intrusion detection in network-based IDS. Int J Intell Syst Appl 6(2):61\u201368. \nhttps:\/\/doi.org\/10.5815\/ijisa.2014.02.08","journal-title":"Int J Intell Syst Appl"},{"key":"29_CR29","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:TELS.0000032945.92937.8f","volume":"27","author":"N Kryvinska","year":"2004","unstructured":"Kryvinska N (2004) Intelligent network analysis by closed queuing models. Telecommun Syst 27:85\u201398. \nhttps:\/\/doi.org\/10.1023\/B:TELS.0000032945.92937.8f","journal-title":"Telecommun Syst"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Data-Centric Business and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-43070-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,20]],"date-time":"2020-06-20T11:14:27Z","timestamp":1592651667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-43070-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,21]]},"ISBN":["9783030430696","9783030430702"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-43070-2_29","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2020,6,21]]},"assertion":[{"value":"21 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}