- pinyuchuli 对语音信号进行倒谱分析 和前面传的一样都是对语音信号的参数的提取
- wyLogistic JSP和MySql做的物流管理系统
- ridgesegment this program can compute the ridge segment in your image. and u can use it
- TheRealizationofAdaptiveArithmeticCoderWithFPGA.ra 本文又用C语言实现了标准的自适应算术编码
- 深入浅出VC++串口编程 详细的介绍关于VC++串口编程的相关知识(Detailed introduction about VC++ serial programming related knowledge)
- newscms 用PHP的TP框架实现的新闻管理信息系统
文件名称:stage
-
所属分类:
- 标签属性:
- 上传时间:2012-11-16
-
文件大小:2.25mb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
The sensor networks application domain continues to increase with the need for an
effective security mechanism. The fact that WSN often deal with sensitive data operating in
hostile and unexpected environments, makes the concept of security considered essential.
However, because of limited resources and low computing capacity of a sensor node, the
development of a mechanism that ensures security is a real design challenges.
In this report we have tried to propose a new security mechanism dedicated to WSN. Our
main objective is to secure the process of transferring data to the base station. The proposed
protocol protects transferred data against intruder nodes attacks, using a security
mechanism based on the use of control message MAC (Message Authentication Code) for
authentication. Our protocol performances are evaluated using the simulator NS2.
effective security mechanism. The fact that WSN often deal with sensitive data operating in
hostile and unexpected environments, makes the concept of security considered essential.
However, because of limited resources and low computing capacity of a sensor node, the
development of a mechanism that ensures security is a real design challenges.
In this report we have tried to propose a new security mechanism dedicated to WSN. Our
main objective is to secure the process of transferring data to the base station. The proposed
protocol protects transferred data against intruder nodes attacks, using a security
mechanism based on the use of control message MAC (Message Authentication Code) for
authentication. Our protocol performances are evaluated using the simulator NS2.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
stage.pdf
1999-2046 搜珍网 All Rights Reserved.
本站作为网络服务提供者,仅为网络服务对象提供信息存储空间,仅对用户上载内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
