咨询与建议

限定检索结果

文献类型

  • 10 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 14 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 14 篇 工学
    • 9 篇 计算机科学与技术...
    • 5 篇 信息与通信工程
    • 4 篇 电气工程
    • 3 篇 仪器科学与技术
    • 2 篇 测绘科学与技术
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 软件工程
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 14 篇 wireless sensor ...
  • 3 篇 distributed prot...
  • 3 篇 intrusion detect...
  • 3 篇 node replication...
  • 3 篇 efficiency
  • 2 篇 clustering
  • 2 篇 resilience
  • 2 篇 classification
  • 2 篇 feature selectio...
  • 1 篇 internet of thin...
  • 1 篇 secure key manag...
  • 1 篇 data trustworthi...
  • 1 篇 public key crypt...
  • 1 篇 elliptic curve c...
  • 1 篇 telecommunicatio...
  • 1 篇 iot applications
  • 1 篇 security of data
  • 1 篇 intelligent comp...
  • 1 篇 data trustworthi...
  • 1 篇 clone node attac...

机构

  • 2 篇 univ roma la sap...
  • 1 篇 natl inst techno...
  • 1 篇 tsinghua univ de...
  • 1 篇 univ rome tre di...
  • 1 篇 pla unit 61135 p...
  • 1 篇 george mason uni...
  • 1 篇 china univ geosc...
  • 1 篇 chalmers univ te...
  • 1 篇 cairo univ fac e...
  • 1 篇 kyushu univ ctr ...
  • 1 篇 iran univ sci & ...
  • 1 篇 china jiliang un...
  • 1 篇 concordia univ c...
  • 1 篇 computer enginee...
  • 1 篇 univ sydney sch ...
  • 1 篇 china jiliang un...
  • 1 篇 nahda univ elect...
  • 1 篇 univ sindh inst ...
  • 1 篇 natl res inst as...

作者

  • 2 篇 di pietro robert...
  • 2 篇 conti mauro
  • 2 篇 mei alessandro
  • 1 篇 setia sanjeev
  • 1 篇 rabie a. ramadan
  • 1 篇 hu linglong
  • 1 篇 roy sankardas
  • 1 篇 sharifi mohsen
  • 1 篇 malkani yasir ar...
  • 1 篇 cui hui
  • 1 篇 samy lotfy
  • 1 篇 li rong
  • 1 篇 ihab talkhan
  • 1 篇 zia tanveer
  • 1 篇 wang lingyu
  • 1 篇 ardakani saeed p...
  • 1 篇 pan julong
  • 1 篇 kashi saeed sedi...
  • 1 篇 mala c.
  • 1 篇 tsigas philippas

语言

  • 13 篇 英文
  • 1 篇 中文
检索条件"主题词=Wireless Sensor Networks Security"
14 条 记 录,以下是1-10 订阅
排序:
Non-zero-sum game-based trust model to enhance wireless sensor networks security for IoT applications
收藏 引用
IET wireless sensor SYSTEMS 2019年 第4期9卷 218-226页
作者: Abdalzaher, Mohamed S. Samy, Lotfy Muta, Osamu Natl Res Inst Astron & Geophys Seismol Dept Natl Seism Network Lab Elmarsad St Cairo 11421 Egypt Nahda Univ Elect & Commun Engn Dept Bani Suwayf Egypt Kyushu Univ Ctr Japan Egypt Cooperat Sci & Technol Nishi Ku 744 Motooka Fukuoka Fukuoka 8190395 Japan
Nowadays, trust models of wireless sensor networks (WSNs) security have flourished due to the day-to-day attack challenges, which are most popular for internet of things (IoT). This article proposes a trust model base... 详细信息
来源: 评论
Distributed Intrusion Detection System for wireless sensor networks  9
Distributed Intrusion Detection System for Wireless Sensor N...
收藏 引用
9th International Conference on Next Generation Mobile Applications, Services and Technologies
作者: Medhat, Karen Ramadan, Rabie A. Talkhan, Ihab Cairo Univ Fac Engn Dept Comp Engn Cairo Egypt
wireless sensor networks is extensively used in many of applications related to different fields. Some of those applications deal with confidential and critical data that must be protected from unauthorized access. So... 详细信息
来源: 评论
Analysis of ECC for Application Specific WSN security  6
Analysis of ECC for Application Specific WSN Security
收藏 引用
2015 IEEE International Conference on Computational Intelligence and Research (ICCIC)
作者: Nair, Biji Mala, C. Natl Inst Technol Dept Comp Sci & Engn Tiruchirappalli Tamil Nadu India
The range of applications based on wireless sensor Network (WSN) is wide and numerous. security solution implementation is a major issue as these networks are formed from resource constrained tiny sensor nodes which h... 详细信息
来源: 评论
On Node Replication Attack in wireless sensor networks
收藏 引用
MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY 2015年 第4期34卷 413-424页
作者: Qabulio, Mumtaz Malkani, Yasir Arfat Keerio, Ayaz Ahmed Univ Sindh Inst Math & Comp Sci Jamshoro Pakistan
WSNs (wireless sensor networks) comprise a large number of small, inexpensive, low power and memory constrained sensing devices (called sensor nodes) that are densely deployed to measure a given physical phenomenon. S... 详细信息
来源: 评论
Distributed Intrusion Detection System for wireless sensor networks
Distributed Intrusion Detection System for Wireless Sensor N...
收藏 引用
International Conference on Next Generation Mobile Applications, Services and Technologies
作者: Karen Medhat Rabie A. Ramadan Ihab Talkhan Computer Engineering Department Faculty of Engineering Cairo University Egypt
wireless sensor networks is extensively used in many of applications related to different fields. Some of those applications deal with confidential and critical data that must be protected from unauthorized access. So... 详细信息
来源: 评论
Weighted k Nearest Neighbour-based Cooperation Intrusion Detection System for wireless sensor networks
Weighted k Nearest Neighbour-based Cooperation Intrusion Det...
收藏 引用
International Conference on Information Technology and Management Innovation (ICITMI2012)
作者: Pan, Julong Hu, Linglong Li, Wenjin Cui, Hui Li, Ziyin China Jiliang Univ Coll Informat Engn Hangzhou 310018 Peoples R China China Jiliang Univ Coll Opt Engn Hangzhou 310018 Peoples R China
To identify the malicious nodes timely in wireless sensor networks(WSNs), a cooperation intrusion detection scheme based on weighted k Nearest Neighbour(kNN) is proposed. Given a few types of sensor nodes, the test mo... 详细信息
来源: 评论
Adaptive Active Defense Mechanism in wireless sensor networks
Adaptive Active Defense Mechanism in Wireless Sensor Network...
收藏 引用
2nd International Symposium on Instrumentation and Measurement, sensor Network and Automation (IMSNA)
作者: Hu, Yu Li, Rong Tsinghua Univ Dept Comp Sci & Technol Beijing Peoples R China PLA Unit 61135 Nanjing Jiangsu Peoples R China
security in wireless sensor networks (WSNs) is very important. Traditional security schemes abandon compromised nodes and add a lot of redundancies to make the network resilient. These methods are not applicable to re... 详细信息
来源: 评论
Distributed Detection of Clone Attacks in wireless sensor networks
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2011年 第5期8卷 685-698页
作者: Conti, Mauro Di Pietro, Roberto Mancini, Luigi Vincenzo Mei, Alessandro Univ Roma La Sapienza Dipartimento Informat I-00198 Rome Italy Univ Rome Tre Dipartimento Matemat I-00146 Rome Italy
wireless sensor networks (WSNs) are often deployed in hostile environments where an adversary can physically capture some of the nodes, first can reprogram, and then, can replicate them in a large number of clones, ea... 详细信息
来源: 评论
Towards a Bio-inspired security Framework for Mission-Critical wireless sensor networks
Towards a Bio-inspired Security Framework for Mission-Critic...
收藏 引用
4th International Symposium on Intelligence Computation and Applications
作者: Ren, Wei Song, Jun Ma, Zhao Huang, Shiyong China Univ Geosci Sch Comp Sci Dept Informat Secur Wuhan 430074 Peoples R China
Mission-critical wireless sensor networks (WSNs) have been fount, in numerous promising applications in civil and military fields. However, the functionality of WSNs extensively relies on its security capability for d... 详细信息
来源: 评论
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale sensor networks
收藏 引用
IEEE TRANSACTIONS ON MOBILE COMPUTING 2010年 第7期9卷 913-926页
作者: Zhu, Bo Setia, Sanjeev Jajodia, Sushil Roy, Sankardas Wang, Lingyu Concordia Univ Concordia Inst Informat Syst Engn Montreal PQ H3G 2W1 Canada George Mason Univ Dept Comp Sci Fairfax VA 22030 USA
Due to the poor physical protection of sensor nodes, it is generally assumed that an adversary can capture and compromise a small number of sensors in the network. In a node replication attack, an adversary can take a... 详细信息
来源: 评论