Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] A review of attacks and security protocols for wireless sensor networks
With the development of the wireless communication technology and the improvement of the
performance of the MEMS sensor, wireless sensor networks are widely used in various …
performance of the MEMS sensor, wireless sensor networks are widely used in various …
[HTML][HTML] A secure model against mobile sink replication attacks in unattended sensor networks
B Zhou, S Li, J Wang, Y Cheng, J Wu - computer networks, 2023 - Elsevier
Unattended wireless sensor networks (UWSNs), in which mobile sinks (MSs) are
responsible for the data collection, and which are vulnerable to multiple attacks. For …
responsible for the data collection, and which are vulnerable to multiple attacks. For …
A secure scheme based on one-way associated key management model in wireless sensor networks
S Li, B Zhou, Q Hu, J Wang, J Dai… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
To achieve security in wireless sensor networks (WSNs), it is important to be able to encrypt
messages sent among sensor nodes by using shared keys between them. Due to resource …
messages sent among sensor nodes by using shared keys between them. Due to resource …
A New Pairwise Key Scheme Based on Deployment Knowledge in Multi-Phase Sensor Networks
S Li, B Zhou, D Miao, Y Cheng… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
The lifetime of a sensor network is generally longer than that of a single sensor node, so to
ensure the connectivity of the network, new nodes need to be deployed into the network in …
ensure the connectivity of the network, new nodes need to be deployed into the network in …
Kablosuz algilayici ağlarda güvenlik sorunlari ve alinabilecek önlemler
Günümüzde kablosuz algılayıcı ağların verimliliği ve kullanılabilirliği hakkında birçok
çalışma olmasına rağmen bu ağların güvenliği konusunda yeterli miktarda çalışma yoktur …
çalışma olmasına rağmen bu ağların güvenliği konusunda yeterli miktarda çalışma yoktur …
A new key predistribution scheme for multiphase sensor networks using a new deployment model
During the lifecycle of sensor networks, making use of the existing key predistribution
schemes using deployment knowledge for pairwise key establishment and authentication …
schemes using deployment knowledge for pairwise key establishment and authentication …
An efficient authentication scheme based on deployment knowledge against mobile sink replication attack in UWSNs
Unattended wireless sensor networks (UWSNs) are vulnerable to mobile sink (MS)
replication attack. In this attack, using the compromised key information, an attacker can …
replication attack. In this attack, using the compromised key information, an attacker can …
PAPG: Private aggregation scheme based on privacy-preserving gene in wireless sensor networks
W Zeng, P Chen, H Chen, S He - KSII Transactions on Internet and …, 2016 - koreascience.kr
This paper proposes a privacy-preserving aggregation scheme based on the designed P-
Gene (PAPG) for sensor networks. The P-Gene is constructed using the designed erasable …
Gene (PAPG) for sensor networks. The P-Gene is constructed using the designed erasable …
A secure scheme based on layer model in multi-phase sensor networks
In some sensor networks, the pre-distribution schemes are based on deployment
knowledge. As a result, the performance of such a sensor network could remarkably decline …
knowledge. As a result, the performance of such a sensor network could remarkably decline …
Energy-efficiency concept for the manufacturing industry
V Stich, N Hering, CP Starick… - Advances in Production …, 2013 - Springer
Depletion of fossil energy sources, rising energy prices and government regulation coerces
manufacturing companies to foster their energy-efficiency. Among others, Information and …
manufacturing companies to foster their energy-efficiency. Among others, Information and …