Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Liang-Min Wang"'
Publikováno v:
网络与信息安全学报, Vol 2, Pp 1-12 (2016)
The functions and characteristics of current IOV(Internet of vehicles) Internet of vehicles were analyzed.Moreover,combined with 5G communication technology,the architecture of IOV for 5G was proposed to imple-ment access and integration of multi-net
Externí odkaz:
https://doaj.org/article/83b2df343f044a2993ffce927085da0f
Publikováno v:
网络与信息安全学报, Vol 2, Pp 41-54 (2016)
Instead of focusing on concrete security requirements of each IOV applying scenario,the architecture characteristics of the IOV networking systems were summarized,and the main security problems were extracted by analyzing the connotation and network
Externí odkaz:
https://doaj.org/article/b189026e8bd748b6a79b5647511d4232
Publikováno v:
Sensors, Vol 20, Iss 7, p 1836 (2020)
The advent of sensor-cloud technology alleviates the limitations of traditional wireless sensor networks (WSNs) in terms of energy, storage, and computing, which has tremendous potential in various agricultural internet of things (IoT) applications.
Externí odkaz:
https://doaj.org/article/9a04e98bbe5b4faa975741dca6bcd1eb
Publikováno v:
Tongxin xuebao, Vol 35, Pp 233-239 (2014)
Vehicle networking intrusion detection solutions (IDS) can be used to confirm the authenticity of the events described in the notice of traffic incidents.The current Vehicle networking IDS frequently use detection scheme based on the consistency of r
Externí odkaz:
https://doaj.org/article/b9a6e905492343f0867ba4c3eb9fe234
Publikováno v:
Tongxin xuebao, Vol 35, Pp 256-260 (2014)
Secure data aggregation in wireless sensor networks can effectively prevent privacy leakage,data tampering and other issues,it also achieves efficient data transmission.An integrity verification protocol based on privacy homomorphism data aggregation
Externí odkaz:
https://doaj.org/article/d39e59d83555446b8e876869d0528175
Publikováno v:
Tongxin xuebao, Vol 33, Pp 178-185 (2012)
The detection schemes proposed so far are not satisfactory because they are energy and memory demanding,not suit for use in resource-constrained wireless sensor networks.the detection of replica attack was focused on in WSN.from the intuition that mo
Externí odkaz:
https://doaj.org/article/6bc0c4c0cc85438e8656699511d663a6
Publikováno v:
Tongxin xuebao, Vol 33, Pp 180-189 (2012)
Location-based services in VANET solved the problem of road safety,and provided the convenient services to drivers and passengers.But it also brought new problems of privacy protection.The content of privacy protection was analyzed,and put emphasis o
Externí odkaz:
https://doaj.org/article/6a4e1623979d4dde922b43a83c009381
Autor:
Yang Shi, Liang-Min Wang
Publikováno v:
Sensors, Vol 11, Iss 3, Pp 2496-2504 (2011)
Replica attack is a critical concern in the security of wireless sensor networks. We employ mobile nodes as patrollers to detect replicas distributed in different zones in a network, in which a basic patrol detection protocol and two detection algori
Externí odkaz:
https://doaj.org/article/bb79c928459f480894db8586a74f81cf
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2010 (2010)
Wireless sensor networks are often deployed in hostile and unattended environments. The nodes will be failure by fault, intrusion, and the battery exhaustion. Node-failure tolerance is an acceptable method to improve the networks' lifetime. Then two
Externí odkaz:
https://doaj.org/article/bf4ca8e6e78546c1993ba2aa2ffd8d15
Autor:
Liang-Min Wang, Cunming Liang, Xiuchun Lu, Chenbo Xia, John Morgan, Wayne Willey, Miao Li, Timothy Miskell
Publikováno v:
2022 IEEE International Conference on Networking, Architecture and Storage (NAS).