The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Security plays an important role in the ability to deploy and retrieve trustworthy data for a wireless sensor network. Secure coverage is an effective defense against attacks which take advantage of a lack of deployment information. In this work, on the basis of improved genetic algorithm, a novel algorithm is proposed to guarantee the effect of secure surveillance. Comparison and simulation results...
The spatiotemporal and just-in-time mobile multicast routing protocol of Wireless Sensor Network, such as Mobicast, which has the perfect usefulness in monitoring Mobile entities, Communications with higher security requirements. Most of the existing Mobicast routing protocols is focused on the group key distribution and management, but also realized under the conditions of static grouping, which...
Wireless communications are central part of the new military doctrines, based on interacting networks in the physical, information, cognitive, and social domains. In particular, it is important to enable flexible and secure communications among groups of stationary nodes, such as sensor nodes that collect information about the battlefield, and mobile nodes that operate in the same environment, such...
Aimed at developing an effective approach to future sensor networks, we proposed for the first time the tiered mobile network architecture and triangle-grid model, studied the problem of wireless sensor network security detection and the nodes movement control policy. Based on the model, we proposed an immune intrusion detection schema and a dynamic two-anchor nodes localization algorithm with classified...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.