Zobrazeno 1 - 10
of 220
pro vyhledávání: '"Tae Ho Cho"'
Autor:
Jung Sub Ahn, Tae Ho Cho
Publikováno v:
IEEE Access, Vol 10, Pp 119232-119243 (2022)
Data security is becoming increasingly important with the growing popularity of smart management systems combining wireless sensor networks (WSNs) and intelligent systems in industrial, agricultural, and construction fields. Traditional security meth
Externí odkaz:
https://doaj.org/article/b06c8ce7962d4ef09ff228b3cae7db6f
Autor:
Su Man Nam, Tae Ho Cho
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 16 (2020)
In wireless sensor networks, sensors are extremely vulnerable to false positive and false negative attacks due to their stringent energy and computational constraints. Several en-route filtering schemes mainly focus on saving energy through early det
Externí odkaz:
https://doaj.org/article/11a196d978f5456c99608231a1e830a3
Publikováno v:
Sukkur IBA Journal of Computing and Mathematical Sciences, Vol 1, Iss 1, Pp 52-57 (2017)
In this paper, we present a technique that detects both false positive and false negative attacks in statistical filtering-based wireless sensor networks. In statistical filtering scheme, legitimate reports are repeatedly verified en route before the
Externí odkaz:
https://doaj.org/article/0226c96c038c444f929a2a63b0c8b1e4
Autor:
Tae Ho Cho
Publikováno v:
Symmetry, Vol 12, Iss 9, p 1568 (2020)
Generally, simulation models are constructed to replicate and predict the behavior of real systems that currently exist or are expected to exist in the future. Once a simulation model is implemented, the model can be connected to a real system for wh
Externí odkaz:
https://doaj.org/article/c15d2f1b4db44ffa85f77ae903506d27
Publikováno v:
Sukkur IBA Journal of Computing and Mathematical Sciences, Vol 2, Iss 1 (2018)
In Wireless sensor networks, energy efficiency can be achieved by adaptive choice of the data forwarding path to balance the energy dissipation in the network. This adaptive path selection is done through a fuzzy rule-based method given the input par
Externí odkaz:
https://doaj.org/article/a903458b0e214c5db2929848bf9d7c38
Publikováno v:
Sensors, Vol 11, Iss 2, Pp 1396-1404 (2011)
In applications of wireless sensor networks, there are many security issues. Attackers can create false reports and transmit the reports to the networks. These false reports can lead not only false alarms, but also the depletion of limited energy res
Externí odkaz:
https://doaj.org/article/e6ea1577c0314f65baa9578f854f4993
Autor:
Muhammad Akram, Tae Ho Cho
Publikováno v:
Symmetry, Vol 9, Iss 10, p 220 (2017)
Wireless sensor networks are supplied with limited energy resources and are usually installed in unattended and unfriendly environments. These networks are also highly exposed to security attacks aimed at draining the energy of the network to render
Externí odkaz:
https://doaj.org/article/c63209d717684195ae0828e4d3524dd0
Autor:
Soo Young Moon, Tae Ho Cho
Publikováno v:
The Scientific World Journal, Vol 2014 (2014)
Authentication is an important security mechanism for detecting forged messages in a sensor network. Each cluster head (CH) in dynamic key distribution schemes forwards a key dissemination message that contains encrypted authentication keys within it
Externí odkaz:
https://doaj.org/article/4f0eb0284f584d56abd02bc426f6cbf3
Publikováno v:
Indian Journal of Dermatology, Vol 60, Iss 5, Pp 523-523 (2015)
Eccrine poromas are benign, slow-growing, solitary tumors originating from the intraepidermal portion of eccrine sweat ducts. Approximately 65% of these tumors occur on the soles of the feet, while 10% occur on the hands where a high concentration of
Externí odkaz:
https://doaj.org/article/510b884b7209418b8d53cdb8066f4038
Autor:
Muhammad K. Shahzad, Tae Ho Cho
The widespread application of wireless sensor networks (WNSs) is obstructed by the severely limited energy constraints and security threat for sensor nodes. Since traditional routing and security schemes are not suited for these networks, a large par
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::81b5c53f0230899c42b65d2aa6e890d3