Zobrazeno 1 - 10
of 97
pro vyhledávání: '"Qiying Cao"'
Publikováno v:
IEEE Access, Vol 8, Pp 43876-43887 (2020)
Heterogeneous and mobile wireless sensor networks (HMWSNs) are generally practical in constructing smart Internet of Things. However, malware can easily propagate itself over HMWSNs and make harm such as data interception and unauthorized activities.
Externí odkaz:
https://doaj.org/article/9aa2d23715e94c61b70a7d893649dc82
Publikováno v:
Dianxin kexue, Vol 35, Pp 60-69 (2019)
The theoretical model for the malware infection in wireless sensor networks (WSN) based on cellular automaton and static Bayesian game was studied.Firstly,the malware infection model of WSN based on cellular automaton was built.Secondly,the malware i
Externí odkaz:
https://doaj.org/article/8bbb8a4553384731b7f3803f58d520ee
Publikováno v:
IEEE Access, Vol 7, Pp 92881-92892 (2019)
Heterogeneous wireless sensor networks (WSNs) are widely deployed, owing to their good capabilities in terms of network stability, dependability, and survivability. However, they are prone to the spread of malware because of the limited computational
Externí odkaz:
https://doaj.org/article/b0b23863757a49caaa110b382922a975
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 16 (2020)
Wireless sensor networks, as a multi-hop self-organized network system formed by wireless communication, are vulnerable to malware diffusion by breaking the data confidentiality and service availability, owing to their low configuration and weak defe
Externí odkaz:
https://doaj.org/article/7bd01687601d4beeaa0f38adb8053971
Publikováno v:
Dianxin kexue, Vol 34, Pp 78-86 (2018)
To apply intrusion detection system (IDS) efficiently so as to suppress WSN malware propagation,a cloud-based network infrastructure for realizing functions of WSN IDS was presented,considering the real basis that the resources of WSN nodes were limi
Externí odkaz:
https://doaj.org/article/8d074c9d22684a5587932dcac1f82615
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 14 (2018)
NB-IoT (Narrowband Internet of Things), as a part of new-generation cellular communication technology, leads an innovation in wireless sensor networks. It pushes wireless sensor networks to be applied in more application fields. NB-IoT Release 14 has
Externí odkaz:
https://doaj.org/article/a1b916644b364730bbc74a14b4851df9
Publikováno v:
Dianxin kexue, Vol 30, Pp 73-79 (2014)
By developing the classical wire-tap channel, an approach was proposed to compute the secrecy rate between a sensor node and its responsible cluster head in the clustered wireless sensor network. A non-cooperative secrecy rate game model was formulat
Externí odkaz:
https://doaj.org/article/36b60e803cd14d228512b071d68977ef
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 12 (2016)
A Wireless Sensor Network (WSN), characterized as being self-organizing and multihop, consists of a large number of low-power and low-cost nodes. The cooperation among nodes is the foundation for WSNs to achieve the desired functionalities, such as t
Externí odkaz:
https://doaj.org/article/5e8c378046d448009d2583fcb396fabe
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 11 (2015)
Applying an Intrusion Detection System (IDS) to Wireless Body Area Networks (WBANs) becomes a costly task for body sensors due to their limited resources. To solve this problem, a cloud-assisted IDS framework is proposed. We adopt a new distributed-c
Externí odkaz:
https://doaj.org/article/45f724fa04114c36bf1e86e9675e369b
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 11 (2015)
Wireless sensor networks (WSNs) provide network services through the cooperation of sensor nodes, while the basis of cooperation depends on the trust relationships among the nodes. In this paper, we construct an evolutionary game-based trust strategy
Externí odkaz:
https://doaj.org/article/a655d19ee78f4dc39566b47555cd7ce3