نتایج جستجو برای: node capture
تعداد نتایج: 287175 فیلتر نتایج به سال:
Key management plays fundamental role in research on security service in wireless sensor networks (WSNs). However, due to the resource constraints, establishing pairwise keys in WSNs is not a trivial tasks. Several exiting key management schemes have been proposed in literature to establish pairwise keys between sensor nodes, but they either can not offer strong resilience against node capture ...
In wireless sensor networks (WSN), there are many nodes and they are unattended so an adversary can easily capture and compromise the sensor nodes and take secret key from the nodes then make many replicas (duplicate) of them. After getting the secret key from the sensor node the sensitive data which is present in the nodes get leaked so an adversary can quickly degrades the network communicati...
With the goal of addressing the issue of image compression in wireless multimedia sensor networks with high recovered quality and low energy consumption, an image compression and transmission scheme based on non-negative matrix factorization (NMF) is proposed in this paper. First, the NMF algorithm theory is studied. Then, a collaborative mechanism of image capture, block, compression and trans...
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. These vulnerabilities are exacerbated when WSNs have to operate unattended in a hostile environment, such as battlefields. In such an environment, an adversary poses a physical threat to all the sensor nodes. An adversary ...
In unattended areas, the wireless sensor network is deployed and nodes are always open to attacks. An adversary can capture a node deploy many nodes, which clone of captured, in called or replicated by using credential information retrieved from captured node. These damage directly indirectly. This attack replication o attack. this area, so works introduced all these methods use random key code...
It is widely believed that although being more complex, a probabilistic key predistribution scheme is much more resilient against node capture than a deterministic one in lightweight wireless ad hoc networks. Backed up by the surprisingly large successful attack probabilities computed in this paper, we show that the probabilistic approaches have only limited performance advantages over determin...
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. These vulnerabilities are exacerbated when WSNs have to operate unattended in a hostile environment, such as battlefields. In such an environment, an adversary poses a physical threat to all the sensor nodes, that is, an a...
background : toxoplasmosis is a worldwide endemic disease. in congenitally infected infants and aids patients, toxoplasmosis causes high rates of morbidity and mortality. in these cases antibody detection is difficult; so detection of parasite or its components could be useful tool for early detection and following treatment of the infection. methods : sixty-three balb/c mice were injected intr...
Wireless sensor networks (WSNs) consist of sensor nodes that onward the sensed data in form of packets within the deployed network. Efficient packet forwarding is a key constraint in sensor networks and many demanding tasks in the network, together with redundancy estimation and sensor node localization depend principally on packet forwarding. Location based forwarding schemes have recently evo...
We show that prominent centrality measures in network analysis are all based on additively separable and linear treatments of statistics capture a node’s position the network. This enables us to provide taxonomy distills them varying two dimensions: (i) which information they make use about nodes’ positions, (ii) how is weighted as function distance from node question. The three sorts positions...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید