搜索资源列表
-
0下载:
In this paper, we propose
a novel scheme for detecting clone attacks in sensor networks,
which computes for each sensor a social fingerprint
by extracting the neighborhood characteristics, and verifies
the legitimacy of the originator for eac
-
-
0下载:
In this dissertation, there are four main aspects included: energy reservation on
MAC layer, secure improvement for DoS attacks on MAC layer, query processing with
uncertainty for sensor systems, and throughput maximization on MAC layer
for ult
-