Post harvesting Onion Storage Methodology Using IOT

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Post-Quantum Secure Onion Routing

The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetric session keys using a secure key exchange between the anonymous users and the selected nodes. The Tor network currently employs a one-way authenticated key exchange (1W-AKE) protocol ntor for this ...

متن کامل

Post-Quantum Forward-Secure Onion Routing

The onion routing (OR) network Tor provides anonymity to its users by routing their encrypted traffic through three proxies (or nodes). The key cryptographic challenge, here, is to establish symmetric session keys using a secure key exchange between the anonymous user and the selected nodes. The Tor network currently employs a one-way authenticated key exchange (1W-AKE) protocol ntor for this p...

متن کامل

Learning-Based Computation Offloading for IoT Devices with Energy Harvesting

Internet of Things (IoT) devices can apply mobileedge computing (MEC) and energy harvesting (EH) to provide the satisfactory quality of experiences for computation intensive applications and prolong the battery lifetime. In this article, we investigate the computation offloading for IoT devices with energy harvesting in wireless networks with multiple MEC devices such as base stations and acces...

متن کامل

Poster: Multi-source Energy Harvesting for IoT nodes

Power consumption is a primary concern for wireless sensor networks. In order to reduce the use of batteries in the nodes, energy harvesting technologies have been considered. However, most of the existing solutions rely on a single energy source, thus potentially reducing the sensor sustainability. In this paper, we present a circuit that switches between multiple heterogeneous energy sources,...

متن کامل

Harvested Energy-adaptive Mac Protocol for Energy Harvesting Iot Networks

In energy harvesting IoT networks, an energy queue state of an IoT device will change dynamically and the number of IoT devices that transmit data to the IoT AP will vary in a frame. So we need a MAC protocol to adjust the frame length taking the amount of energy of IoT devices into consideration. Since the existing Framed slotted ALOHA (F-ALOHA) Medium Access Control (MAC) protocol utilizes th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IJARCCE

سال: 2019

ISSN: 2319-5940,2278-1021

DOI: 10.17148/ijarcce.2019.8504