搜索资源列表
-
0下载:
一篇關於无线传感器网络安全的文檔,對學習此方面之知識有莫大幫助-An article on wireless sensor network security documents, to learn the knowledge in this regard have been of enormous assistance
-
-
0下载:
wireless sensor network security
-
-
0下载:
Zigbee无线传感器网络在安全监测系统中的应用-Zigbee wireless sensor network security monitoring system
-
-
0下载:
Wireless Sensor Network security Cryptology and Information
-
-
0下载:
Wireless Sensor Networks (WSNs) have attracted much attention in recent years. The potential applications of WSNs
are immense. They are used for collecting, storing and sharing sensed data. WSNs have been used for various applica-
tions includin
-
-
0下载:
In this presentation, Various security threats face by routing protocols in wireless sensor network is presented.
-
-
0下载:
Wireless Sensor Networks (WSN) are becoming popular day by day,
however one of the main issue in WSN is its limited resources. We
have to look to the resources to create Message Authentication Code
(MAC) keeping in mind the feasibility of techn
-
-
0下载:
Wireless Sensor Networks (WSN) have recently been in the limelight for many domains. WSN are useful in data collection, event detection or entity tracking applications. The characteristics of sensor networks have imposed various restrictions on their
-
-
0下载:
针对大型建筑物复杂环境室内定位的特殊性,为了克服移动终端采用WLAN或无
线传感器网络单独定位精度不高的局限性,实现移动终端精确定位导航,提出了根据终端位
置环境同时搜索WLAN和无线传感器网络,采用改进后的网络融合定位算法,可以为用户
提供高精度、高概率和高保密性的定位业务。-For large buildings in the complex environment of indoor positioning particularity, in order to overcome
-
-
0下载:
传感器网络安全现状、面临的安全挑战及其需要解决的安全问题。-The current situations of sensor network security, the security challenges and the security problems were pre-
sented.
-
-
0下载:
Smart home is a house that uses technology to monitor the environment with the help of various sensors, control the electrical appliances and communicate the outer world. Now-a-days the demand for home automation systems in homes and offices are inva
-
-
0下载:
Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or
more sensor nodes and reveal all stored security information which enables him to compromise a part of the
WSN communications. Due to lar
-