CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 搜索资源 - attacks in sensor networks

搜索资源列表

  1. CloneDetection-ICDCS2008

    0下载:
  2. In this paper, we propose a novel scheme for detecting clone attacks in sensor networks, which computes for each sensor a social fingerprint by extracting the neighborhood characteristics, and verifies the legitimacy of the originator for eac
  3. 所属分类:Communication

    • 发布日期:2017-04-08
    • 文件大小:182.35kb
    • 提供者:sireine
  1. sensors-09-03958

    0下载:
  2. We propose a trust-based decision framework for wireless sensor networks coupled with a non-deterministic routing protocol. Both provide a mechanism to effectively detect and confine common attacks, and, unlike previous approaches, allow bad re
  3. 所属分类:Development Research

    • 发布日期:2017-04-02
    • 文件大小:713.11kb
    • 提供者:sireine
  1. stage

    0下载:
  2. The sensor networks application domain continues to increase with the need for an effective security mechanism. The fact that WSN often deal with sensitive data operating in hostile and unexpected environments, makes the concept of security consi
  3. 所属分类:Project Manage

    • 发布日期:2017-05-10
    • 文件大小:2.25mb
    • 提供者:magazana
  1. REVW-paper.docx.tar

    0下载:
  2. A Survey of Attacks and Security Mechanisms In Wireless Sensor Networks and in this way we can protect our data from different types of attack
  3. 所属分类:Network Security

    • 发布日期:2017-04-25
    • 文件大小:54.05kb
    • 提供者:sonu
  1. (MAC)-LAYER-DESIGN

    0下载:
  2. In this dissertation, there are four main aspects included: energy reservation on MAC layer, secure improvement for DoS attacks on MAC layer, query processing with uncertainty for sensor systems, and throughput maximization on MAC layer for ult
  3. 所属分类:Communication

    • 发布日期:2017-05-02
    • 文件大小:675.87kb
    • 提供者:amir
  1. ajassp.2014.969.977

    0下载:
  2. Wireless Sensor Networks (WSN) is vulnerable to node capture attacks in which an attacker can capture one or more sensor nodes and reveal all stored security information which enables him to compromise a part of the WSN communications. Due to lar
  3. 所属分类:Development Research

    • 发布日期:2017-04-25
    • 文件大小:141.63kb
    • 提供者:senthil
  1. DSR

    0下载:
  2. Secure routing in wireless sensor networks: attacks and countermeasures
  3. 所属分类:Project Manage

    • 发布日期:2017-04-30
    • 文件大小:12.55kb
    • 提供者:dalila
  1. TDSR-LATEST-CODE

    0下载:
  2. The reliable data delivery is a challenging task in Wireless Sensor Networks (WSNs) due to dynamic and unpredictable changing behaviors of nodes. The traditional cryptographic and authentication based schemes can’t be adopted due to their associated
  3. 所属分类:matlab

    • 发布日期:2017-12-05
    • 文件大小:866byte
    • 提供者:Dharmesh
  1. TAODV-LATEST-CODE

    0下载:
  2. The reliable data delivery is a challenging task in Wireless Sensor Networks (WSNs) due to dynamic and unpredictable changing behaviors of nodes. The traditional cryptographic and authentication based schemes can’t be adopted due to their associated
  3. 所属分类:matlab

    • 发布日期:2017-12-16
    • 文件大小:1kb
    • 提供者:Dharmesh
搜珍网 www.dssz.com