Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - attack nodes
Search - attack nodes - List
本文是一篇关于传感器网络安全的综述,详细地从各个层介绍了它的研究情况。-Wireless sensor networks(WSNs) use small nodes with constrained capabilities to sense,collect,and disseminate information in many types of applications.As sensor networks become wide-spread,security issues become a central concern, especially in mission-criticaltasks.In this paper,we identify the threats and vulnerabilities to WSNs and summarize the defense methods based on the networking protocol layer analys is ?rst.Then we give a holistic overview of security issues.These issues are divided into seven categories:cryptography,keymanage- ment,attack detections and preventions,securer outing,secure location security,secure data fusion,and other security issues. Along the way we analyze thead vantages and disadvantages of current secure schemes in each category.Inaddition,we also summarize the techniques and methods used in these categories,and point out the open research issues and directions in each area.
Date : 2025-12-17 Size : 340kb User : 马宁

AODV attacker ....to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole attack but consequently improves the overall performance of (normal) AODV in presence of black hole attack.
Date : 2025-12-17 Size : 4kb User : madhuri

研究Ienternet的鲁棒性,对某些节点进行蓄意攻击,研究网络的生命周期。-Research Ienternet robustness, deliberate attack on some nodes, research the life cycle of the network.
Date : 2025-12-17 Size : 1.37mb User : 刘莉莉
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.