The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
he usage of random linear network coding in wireless sensor network is consistent with sociality, for this feature, proposed a network coding scheme for sociality for wireless sensor networks. Analyzed the process of coding and decoding of random linear network coding and summarized the advantages and disadvantages of the scheme in practical application, at last through NS2 to compare the scheme of...
For the importance of monitoring system in mine, this paper describes the application of wireless sensor networks for mine safety monitoring. Schemes for clustering and mobile node based on the characteristics of mine wireless sensor networks are proposed in roadway. The simulation results show that the clustering and mobile node schemes achieved in this paper can meet the requirements of mine, and...
Since it is very hard for cluster-based WSN (wireless sensor network) to implement efficient and secure communication either with CSMA or TDMA. In view of the existing situation, a STC-MAC protocol has been put forward, which mingled with CSMA and TDMA and brought about better bottom-layer security. On the one hand, the wireless channel allocated by TDMA in intra-cluster nodes is able to cope with...
In this paper, we present a provably secure routing protocol for wireless sensor networks, called S-SPIN (Secure-SPIN), that is a security extension of SPIN. The MAC scheme is introduced to guarantee the correctness and integrity of the messages. And we prove that under the formal security framework proposed by Acs et al, by using a mathematically rigorous proof technique, S-SPIN is secure if the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.