Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Kerong Feng"'
Publikováno v:
Sensors, Vol 14, Iss 10, Pp 17937-17951 (2014)
With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitat
Externí odkaz:
https://doaj.org/article/60316af1e5b547fc9d387d428d495a33
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 11 (2015)
With the wide adoption of wireless sensor network (WSN), security problems emerge as a challenging issue because of the limited computational power and energy of the sensor nodes. Furthermore, the deployment of WSN in the hostile area with a large nu
Externí odkaz:
https://doaj.org/article/5635c95dc212415bb7e02016f5adbb38
Publikováno v:
Sensors, Vol 14, Iss 10, Pp 17937-17951 (2014)
Sensors
Volume 14
Issue 10
Pages 17937-17951
Sensors (Basel, Switzerland)
Sensors
Volume 14
Issue 10
Pages 17937-17951
Sensors (Basel, Switzerland)
With the rapid development and widespread adoption of wireless sensor networks (WSNs), security has become an increasingly prominent problem. How to establish a session key in node communication is a challenging task for WSNs. Considering the limitat
Publikováno v:
CIS
In wireless sensor networks (WSNs), massive amounts of nodes, volatile network topology and limited resources (such as energy, computing power, storage, bandwidth, and so on) make the traditional security scheme cannot be directly applied to WSNs. Id
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 11 (2015)
With the wide adoption of wireless sensor network (WSN), security problems emerge as a challenging issue because of the limited computational power and energy of the sensor nodes. Furthermore, the deployment of WSN in the hostile area with a large nu
Publikováno v:
2014 Tenth International Conference on Computational Intelligence & Security; 2014, pv-xvi, 12p