Description: Wireless sensor networks based on the use of security access control solutions. In our scenario, the proposed authentication protocol has several advantages, the most important is its computing, storage and communication cost is very low. In addition, our program can also implement those decisions have attributes variability and continuity of access control.
To Search:
File list (Check if you may need any files):
Access Control.pdf