The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to achieve the largest number of distributed network nodes and increase the communication security of network system in the conditions of long-range and high data rate, we introduce registration mechanism of communication nodes with distributed network nodes as the research object in this paper. With the application of single chip microcomputer (SCM) technology, we designed and implemented...
Because of the open-source Linux, users can simply use the basic grammatical rules to complete add, delete, insert the rules. And after all the rules generated, script can be retained. Netfilter / IPtables structure, can be a little mouse suitable for the establishment of their own packet filtering firewall, in order to achieve their own aims and needs.
Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path- based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to- end communication...
Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to-end communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.