The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The severity and number of attacks on computer networks are rapidly increasing. Most existing security solutions concentrate on resisting one or several attacks. We propose an integrated router security framework, called TrustR. It is able to defend against various types of attacks. TrustR integrates collaborating security primitives including cryptography based security mechanisms, trust management...
The paper summarized the routing protocol of wireless sensor network, and then compared the opportunistic routing protocol with traditional routing protocol. The paper proposed an improved method for transmitting candidacy set and collaboration process in the opportunistic routing protocol.
The signals in the e-health support and curing system should be transferred in high quality, but in the traditional wireless network, the quality and the speed of the communications between the mobile e-health computers is slow. According to the three function entities of mobile IPv6 the protocol stack software is divided into several major modules, and proposed design and the division of sub-module...
Because the unstable wireless transmitting channel in wearable system, this article researched the broadcast characteristics of information channel in wearable wireless sensor network, and proposed a opportunistic routing protocol based on random linear network coding. This protocol used the distance unstable chain which can not be used by traditional route protocol. It requires each node except for...
To efficiently exploit the broadcast feature of wireless channels, a opportunistic routing protocol based on random linear network coding is proposed for wireless sensor networks. The protocol requires each node except for destination in network to transmit the random linear combination created by all packets in buffer, and confirms the expected number of transmissions according to node's credit value...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.