版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、The purpose of this research thesis has been to investigate the current state of base station security in wireless sensor networks and to evaluate the potential effectiveness of how candidate base stations can be utilize
2、d in delivering interactive enhanced base station security by improving the existing security protocols currently in use. Base station security protocols are evaluated, candidate base stations are extensively discussed,i
3、ncluding the suggested candidate base station algorithms. Features and structures of currently available base stations and sensor nodes are addressed. Possibilities of compromising base stations and their possible soluti
4、ons are discussed.The major contribution of this thesis is it's furthering of the understanding of the security protocols, models, methodologies and algorithms that can be used in ensuring base station security, availabi
5、lity, efficiency and effectiveness in wireless sensor networks.This thesis demonstrates how candidate base stations are fitted in the base station security protocols and how they can be used to provide a meaningful analy
6、sis of increased base station security. In addition to the specific results presented, the collective wisdom provided by the discussion of the methodologies, protocols, models and algorithms throughout this thesis, provi
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 眾賞文庫(kù)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 外文原文-SECURITY IN WIRELESS SENSOR NETWORKS.pdf
- Explicit Content Caching at Cellular Base Stations for Opportunistic Wireless CDN.pdf
- Security and Energy Performance Optimization In Wireless Sensor Networks.pdf
- Wireless Sensor Networks.pdf
- Groupwise Pairwise Scheme for Wireless Sensor Networks.pdf
- Routing and Security performance in Ad Hoc Wireless Networks.pdf
- Maximum lifetime continuous query processing in wireless sensor networks.pdf
- Energy Balance Among Nodes with Middlewares in Wireless Sensor Networks.pdf
- Maximum lifetime continuous query processing in wireless sensor networks.pdf
- Energy Efficient Clustering,Optimum Data Forwarding for Wireless Sensor Networks.pdf
- Adaptive media access control for energy harvesting — Wireless sensor networks.pdf
- Adaptive media access control for energy harvesting — Wireless sensor networks.pdf
- Rumor as an Energy-Balancing Multipath Routing Protocol for Wireless Sensor Networks.pdf
- An Empirical Analysis Study on the Efficacy of a Rouating Algorithm for Saving Energy in Wireless Sensor Networks.pdf
- Clustering Technigues for Data Management in Sensor Networks.pdf
- Network Coding Design in Wireless Cooperative Networks.pdf
- Distributed Graph Algorithms for Spectrum Allocation in Wireless Networks.pdf
- maximum lifetime continuous query processing in wireless sensor networks
- Seamless Handover decision algorithms and optimization in heterogeneous wireless networks.pdf
- Intelligent Traffic Signal Control Using Wireless Sensor Networks .pdf
評(píng)論
0/150
提交評(píng)論