Cargando…

Preserving Source Location Privacy for Energy Harvesting WSNs

Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-locati...

Descripción completa

Detalles Bibliográficos
Autores principales: Huang, Changqin, Ma, Ming, Liu, Yuxin, Liu, Anfeng
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5421684/
https://www.ncbi.nlm.nih.gov/pubmed/28358341
http://dx.doi.org/10.3390/s17040724