The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently the problem of providing effective and appropriate healthcare to elderly and disable people is an important field in relative to the aging of population problems. The objective of information and communication technologies (ICT) is to focus on the new technologies the medical environments, so that it can provide management to accelerate and improve the clinical process. Our contribution is...
A hierarchical of 160-bit ID space is constructed based on the node's location information (network heterogeneous) and the node's processing capability (node heterogeneous) etc. The problem of the topology consistency is solved by making the hierarchical ID space compatible with that of the physical network. The relay of weighed reputation method is used to realize the storage and collection of the...
Some wireless sensor networks preclude the constant presence of a centralized data collection point, that is, a sink. In such a disconnected or unattended setting, nodes must accumulate sensed data until it can be off loaded to an itinerant sink. Furthermore, if the operating environment is hostile, there is a very real danger of node and data compromise. The unattended nature of the network makes...
Security and privacy of wireless sensor networks are key research issues recently. Most existing researches regarding wireless sensor network security consider homogenous sensor networks. To achieve better security and performance, we adopt a heterogeneous wireless sensor network (HWSN) model that consists of physically different types of sensor nodes. This paper presents a secure message distribution...
Information security is very important in mobile ad- hoc network, especially when the network is applied in security- demanded situation. Due to lower bandwidth and longer delay, wireless network is inefficient when cryptographic method is implemented during data transmission. In this article, a novel method of soft encryption is proposed for multi-path routing data transmission. All messages are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.