Welcome![Sign In][Sign Up]
Location:
Search - wsn security

Search list

[Otherwirl.tcl.tar

Description: new properties to wsn nodes
Platform: | Size: 2048 | Author: kishan | Hits:

[BooksWSNsleach

Description: 基于无线传感器网络的一种安全路由协议 针对无线传感器网络(WSN)中路由协议的安全隐患,提出了一种安全的路由协议.该路由协 议在传统的定向扩散协议基础上增加安全机制,把整个路由过程分为路由建立和路由更新2个阶段,并对其安 全性进行分析.通过在路由建立阶段使用小区密钥和通信密钥,能为网络选择安全的路由;路由更新能在出 现路由故障时重新建立路由,进一步提高了无线传感器网络的路由安全性能. -Wireless sensor networks based on a secure routing protocol for wireless sensor network (WSN) routing protocol in the security risk, a routing protocol security. The routing protocol in the traditional orientation to increase the proliferation of agreements based on the security mechanism, the entire routing process is divided into routing updates and routing to establish two stages, and its security analysis. Routing through the cell-key establishment phase and communication using the key security options for network routing routing update to routing in the event of failure to re-establish routing to further improve the routing of wireless sensor network security .
Platform: | Size: 522240 | Author: 池尚琨 | Hits:

[Otherant.wsn

Description: Wireless Sensor Networks are wireless networks where every nodes recolects surrounding information. WSNs have several aplications such as militar survival, traffic control, building security, scientific research in other planets, etc. This project presents a communication protocol for wireless sensor networks based on the ant colony optimization metaheuristic, which uses artificial ant agents that recolects data from all sensor nodes of the network. Every ants fuzes data from a node and sends it to every other sensor and then to the base station. All ants look for a way to go where there is an energy eficient path.
Platform: | Size: 60416 | Author: rodrigo | Hits:

[SCMwsn

Description: 详细介绍无线传感器网络,包括定位技术、安全、网络管理等,希望对大家有帮助-Details wireless sensor networks, including positioning technology, security, network management, we want to help
Platform: | Size: 6999040 | Author: gaogao | Hits:

[Embeded-SCM DevelopSecure_WSN

Description: security concepts in wsn
Platform: | Size: 308224 | Author: joe | Hits:

[OS programPKC

Description: 基于PKC的WSN安全结构PKC for WSN security architecture based on-PKC for WSN security architecture based on
Platform: | Size: 448512 | Author: ride99 | Hits:

[SCMwsn

Description: 无线传感器网络安全协议设计方面内容,希望对大家有帮助-Wireless sensor network security protocol design aspects, we want to help
Platform: | Size: 829440 | Author: 南希儿 | Hits:

[Technology Managementstage

Description: The sensor networks application domain continues to increase with the need for an effective security mechanism. The fact that WSN often deal with sensitive data operating in hostile and unexpected environments, makes the concept of security considered essential. However, because of limited resources and low computing capacity of a sensor node, the development of a mechanism that ensures security is a real design challenges. In this report we have tried to propose a new security mechanism dedicated to WSN. Our main objective is to secure the process of transferring data to the base station. The proposed protocol protects transferred data against intruder nodes attacks, using a security mechanism based on the use of control message MAC (Message Authentication Code) for authentication. Our protocol performances are evaluated using the simulator NS2.
Platform: | Size: 2359296 | Author: magazana | Hits:

[Program docWSN_OPNET

Description: Wireless Sensor Networks (WSNs) have attracted much attention in recent years. The potential applications of WSNs are immense. They are used for collecting, storing and sharing sensed data. WSNs have been used for various applica- tions including habitat monitoring, agriculture, nuclear reactor control, security and tactical surveillance. The WSN system developed in this paper is for use in precision agriculture applications, where real time data of climatologically and other environmental properties are sensed and control decisions are taken based on it to modify them. The architec- ture of a WSN system comprises of a set of sensor nodes and a base station that communicate with each other and gather local information to make global decisions about the physical environment. The sensor network is based on the IEEE 802.15.4 standard and two topologies for this application. -Wireless Sensor Networks (WSNs) have attracted much attention in recent years. The potential applications of WSNs are immense. They are used for collecting, storing and sharing sensed data. WSNs have been used for various applica- tions including habitat monitoring, agriculture, nuclear reactor control, security and tactical surveillance. The WSN system developed in this paper is for use in precision agriculture applications, where real time data of climatologically and other environmental properties are sensed and control decisions are taken based on it to modify them. The architec- ture of a WSN system comprises of a set of sensor nodes and a base station that communicate with each other and gather local information to make global decisions about the physical environment. The sensor network is based on the IEEE 802.15.4 standard and two topologies for this application.
Platform: | Size: 491520 | Author: eng | Hits:

[Industry researchwsn-security

Description: this document describes the threats faced by the wsn
Platform: | Size: 23552 | Author: gagandeep singh | Hits:

[Program docComparison-Based-Analysis-of-Different-Cryptograp

Description: Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.
Platform: | Size: 747520 | Author: zu | Hits:

[Industry researchACR-WES-v5--copy

Description: Wireless Embedded Systems (WEBs) has attracted significant interest in recent years, for instance, Wireless Sensor Networks (WSN), have recently been in the limelight for many domains. The characteristics of WEBs have imposed various restrictions on their system designs. Since embedded systems usually are developed by low-cost hardware, one major challenge in the development of many WEBs applications is to provide high-security features with limited resources. In this paper, we propose a novel key establishment scheme, named half-key scheme that based on the well-known random key pre-distribution scheme and DDHV-D deployment knowledge to provide resource-efficient key management in WEBs with reduced memory space requirements and better security enforcement. The capability of the proposed approach is evaluated by an analytical model and a series of experiments.
Platform: | Size: 162816 | Author: ufon | Hits:

[Industry researchRTQP-sig-alternate-v2

Description: Wireless Sensor Networks (WSN) have recently been in the limelight for many domains. WSN are useful in data collection, event detection or entity tracking applications. The characteristics of sensor networks have imposed various restrictions on their system designs. Since sensor nodes usually are developed by low-cost hardware, one major challenge in the development of many sensor-network applications is to provide high-security features with limited resources. In this paper, we propose a path generation framework with deadline considerations for real-time query processing. To meet the deadline, the framework will assign the time budget to the routing path, and then, derive a feasible path with the assigned time budget.
Platform: | Size: 323584 | Author: ufon | Hits:

[Program docWLAN-and-WSN-fusion-algorithm

Description: 针对大型建筑物复杂环境室内定位的特殊性,为了克服移动终端采用WLAN或无 线传感器网络单独定位精度不高的局限性,实现移动终端精确定位导航,提出了根据终端位 置环境同时搜索WLAN和无线传感器网络,采用改进后的网络融合定位算法,可以为用户 提供高精度、高概率和高保密性的定位业务。-For large buildings in the complex environment of indoor positioning particularity, in order to overcome the mobile terminal using WLAN or wireless sensor network alone is not high positioning accuracy limitations, to achieve precise positioning and navigation mobile terminal is proposed to simultaneously search and WLAN wireless sensor environment based on terminal location network, using the improved network fusion location algorithm can provide users with high-precision, high-probability and high-security location services.
Platform: | Size: 302080 | Author: 施瞎忙 | Hits:

[Program docmain

Description: code FOR SIMULATE WSN PROBLEM OF SECURITY
Platform: | Size: 2048 | Author: aj | Hits:

[Program docZU212409413

Description: Smart home is a house that uses technology to monitor the environment with the help of various sensors, control the electrical appliances and communicate the outer world. Now-a-days the demand for home automation systems in homes and offices are invariably increasing. The home automation system is a key for energy conservation that can be equipped in normal buildings. As there are many benefits of wireless technology over wired, most of the home automation systems are based on the WSN technology. In this paper we present the design and implementation of a smart home based on LabVIEW using wireless sensor network system. The system can monitor the temperature, light, fire & burglar alarm of the house and have infrared sensor to guarantees the family security. The monitored data is automatically stored into an excel file. The system can be connected to internet to monitor the security of home anywhere in the world.-Smart home is a house that uses technology to monitor the environment with the help of various sensors, control the electrical appliances and communicate the outer world. Now-a-days the demand for home automation systems in homes and offices are invariably increasing. The home automation system is a key for energy conservation that can be equipped in normal buildings. As there are many benefits of wireless technology over wired, most of the home automation systems are based on the WSN technology. In this paper we present the design and implementation of a smart home based on LabVIEW using wireless sensor network system. The system can monitor the temperature, light, fire & burglar alarm of the house and have infrared sensor to guarantees the family security. The monitored data is automatically stored into an excel file. The system can be connected to internet to monitor the security of home anywhere in the world.
Platform: | Size: 490496 | Author: ImranKhan | Hits:

[Program docSecuritySolutionsWSN

Description: security wsn and solution for wireless networks
Platform: | Size: 714752 | Author: ali | Hits:

[matlabAes-security-Wsn

Description: Security algorithms on WSN are devided on two kinds: symetric and asymetric. AES is one of the rebust os symetric methods. AES is simulated with matalb. Very intersting and very useful.
Platform: | Size: 16384 | Author: omarbr | Hits:

[Firewall-Securitynetwork security

Description: Network security in wsn by matlab
Platform: | Size: 1636 | Author: 2381337458@qq.com | Hits:

[Firewall-Securitynetwork security

Description: Document for wsn security ,is helpful
Platform: | Size: 96620 | Author: 2381337458@qq.com | Hits:
« 12 »

CodeBus www.codebus.net