Security is of critical importance for many potential applications of wireless sensor networks. Broadcasting from base station to nodes is very important in the cases such as distributing secure keys in the network or...
详细信息
ISBN:
(纸本)9781612848372
Security is of critical importance for many potential applications of wireless sensor networks. Broadcasting from base station to nodes is very important in the cases such as distributing secure keys in the network or delivering control commands to nodes. However, the sparse distribution and limited resource of nodes bring difficulties to the efficient and reliable broadcast in wireless sensor networks. A lightweight energy-efficient reliable broadcast tree, or LERBT, is proposed to provide a framework by which to support reliable broadcast while reducing the broadcast coverage overlap and power consumption. Additionally, LERBT can configure itself quickly, allowing the base station to begin broadcasting commands shortly after deployment. Simulation results show the protocol can save significant energy over SBA and LKDT without sacrificing the coverage and reachability.
Due to increasing the technologies security systems are very popular in many *** security of information can be achieved by using encryption and *** cryptography,encrypted data is transmitted after transforming the ot...
详细信息
ISBN:
(纸本)9781612848396
Due to increasing the technologies security systems are very popular in many *** security of information can be achieved by using encryption and *** cryptography,encrypted data is transmitted after transforming the other form instead of the original data. Contrast cryptography,information hiding process can be extended for protecting from the interesting of any attacker. This paper proposes the enhance security system by combining these two *** this system,the encrypted message is embedded in a BMP image *** proposed system,three LSB steganographic techniques have been implemented and *** proposed system intends for data confidentiality,data authentication and data *** system not only enhances the security of data but also becomes more powerful *** system intends to support effective ways for protecting *** primary goal of our system is to enhance the security of data and then to compare three steganographic *** we will use the optimized method for *** this paper,we just present three steganographic *** this system,data is encrypted with RC4 encryption algorithm and then embedded the encrypted text in the BMP image file using three steganogrpaphic methods.
This paper mainly talks about the physical model of rubber/PVDF semi-active piezoelectric composite level-based system, and the calculation method of sound energy loss of the system is studied too. The principle of im...
详细信息
In this paper, successfully we had implemented Fant39;s resampling algorithm by using cubic convolution for resampling the images that consists two passes. It does not exhibit the aliasing artifacts associated with ...
详细信息
Windows registry from physical memory contains lots of important information that are of potential evidential value in forensic analysis. In this paper, a method of extracting windows registry information from physica...
详细信息
This paper is proposing a novel idea for text transformation based on mapping single letters form the standard alphabetical order into the same set of single letters reordered by their relative frequencies. This metho...
详细信息
How to retrieve and query large XML documents efficiently has become a challenge in the database field for several years. A few efforts have been made in the past to address this issue. In this paper, we present a nov...
详细信息
The sentiment analysis for English product reviews has been widely researched in recent years, followed with many important achievements. Due to the special language traits of Chinese, the study on Chinese product rev...
详细信息
Malware is one of the major security threats that can break computer operation. However, commercial anti-virus or anti-spyware that used signature-based matching to detects malware cannot solve that kind of threats. N...
详细信息
Stabilization is considered to be a well-established disposal technique to reduce sludge handling and disposal obstacles. A sludge modifier which comprises a mixture of three cementitious components was proposed for s...
详细信息
暂无评论