期刊文献+

面向物联网的无线传感器网络研究 被引量:3

下载PDF
导出
摘要 基于物联网的无线传感器可以突破时间和空间的限制,传输信息。它广泛应用于社会的许多领域,特别是在定位领域。在无线传感器网络中有许多优秀的技术,它们的技术水平相对较高,但随着社会的发展,对无线传感器网络的技术水平提出了更高的要求,因此有必要实现网络优化。
作者 徐拓
出处 《时代农机》 2018年第7期249-249,共1页 Times Agricultural Machinery
  • 相关文献

参考文献2

二级参考文献20

  • 1LAW Y W, HAVINGA P J M. How to secure a wireless sensor network [C]// Proceedings of the 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing. [S.I.] .. IEEE, 2005 .. 89-95. 被引量:1
  • 2PERRIG Adrian, STANKOVIC John, WAGNER David. Security inwireless sensor networks [J]. Communications of the ACM, 2009, 47(6) : 53-57. 被引量:1
  • 3SHI Elaine, PERRIG Adrian. Designing secure sensor networks [J]. IEEE Wireless Communications, 2010, 11(6) .. 38-43. 被引量:1
  • 4GUIMARAES G, SOUTO E, SADOK D, et al. Evaluation of security mechanisms in wireless sensor networks [C]// Proceedings of the 2011 Systems Communications. [S.1.] .- IEEE, 2011 : 428-433. 被引量:1
  • 5VOGT H, RINGWALD M, STRASSER M. Intrusion detection and failure recovery in sensor nodes [C]// Proceedings of 2008 Tagungsband Informatik. Heidelberg, Germany : Springer-Verlag, 2008 : 161-163. 被引量:1
  • 6HARTUNG C, BALASALLE J, HAN R. Node compromise in sensor networks : the need for secure systems [D]. USA : Department of Computer Science, University of Colorado at Boulder, 2005. 被引量:1
  • 7MISHRA A, NADKARNI K, PATCHA A. Intrusion detection in wireless Ad hoc networks [J]. IEEE Wireless Communications, 2012, 11(1) : 48-60. 被引量:1
  • 8LIU Dong-gang, NING Peng, DU Wen-liang. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks [C]// Proceedings of the 25th IEEE International Conference on Distributed Computing Systems. [S.I.] .. IEEE, 2009 : 609-619. 被引量:1
  • 9ONAT I, M1RI A. An intrusion detection system for wireless sensor networks [C]//IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. [S.I.] : IEEE, 2012, 3 : 253-259. 被引量:1
  • 10SESHADRI A, PERRIG A, VAN DOORN L, et al. SWATT: softWare-based attestation for embedded devices [C]// Proceedings of the 2012 IEEE Symposium on Security and Privacy, 2012 : 272- 282. 被引量:1

共引文献6

同被引文献16

引证文献3

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部