Cargando…
Hiding the Source Based on Limited Flooding for Sensor Networks
Wireless sensor networks are widely used to monitor valuable objects such as rare animals or armies. Once an object is detected, the source, i.e., the sensor nearest to the object, generates and periodically sends a packet about the object to the base station. Since attackers can capture the object...
Autores principales: | Chen, Juan, Lin, Zhengkui, Hu, Ying, Wang, Bailing |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4701324/ https://www.ncbi.nlm.nih.gov/pubmed/26593923 http://dx.doi.org/10.3390/s151129129 |
Ejemplares similares
-
Flood and Contain: An Optimized Repeal-Based Flooding Algorithm for Wireless Ad Hoc and Sensor Networks
por: Gomez, Javier, et al.
Publicado: (2020) -
Hide yourself, hide yourself, hide yourself!
Publicado: (2020) -
Lightweight Security Transmission in Wireless Sensor Networks through Information Hiding and Data Flipping
por: Zhou, Lan, et al.
Publicado: (2022) -
Steganography in IoT: Information Hiding with Joystick and Touch Sensors
por: Koptyra, Katarzyna, et al.
Publicado: (2023) -
CONE: A Connected Dominating Set-Based Flooding Protocol for Wireless Sensor Networks
por: Lisiecki, Dennis, et al.
Publicado: (2019)