期刊文献+
共找到344篇文章
< 1 2 18 >
每页显示 20 50 100
Virus spreading in wireless sensor networks with a medium access control mechanism 被引量:4
1
作者 王亚奇 杨晓元 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第4期70-74,共5页
In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical a... In this paper, an extended version of standard susceptible-infected (SI) model is proposed to consider the influence of a medium access control mechanism on virus spreading in wireless sensor networks. Theoretical analysis shows that the medium access control mechanism obviously reduces the density of infected nodes in the networks, which has been ignored in previous studies. It is also found that by increasing the network node density or node communication radius greatly increases the number of infected nodes. The theoretical results are confirmed by numerical simulations. 展开更多
关键词 wireless sensor networks medium access control virus spreading susceptible-infected model
原文传递
The Design of an Intelligent Security Access Control System Based on Fingerprint Sensor FPC1011C
2
作者 Yan Wang Hongli Liu Jun Feng 《Circuits and Systems》 2010年第1期30-33,共4页
This paper deals with the design of an intelligent access control system based on the fingerprint sensor FPC- 1011C. The design uses the S3C2410 and TMS320VC5510A as the system processor. A fingerprint acquisition mod... This paper deals with the design of an intelligent access control system based on the fingerprint sensor FPC- 1011C. The design uses the S3C2410 and TMS320VC5510A as the system processor. A fingerprint acquisition module and a wireless alarm module were designed by using the fingerprint sensor FPC1011C and GPRS module SIM100 respectively. The whole system was implemented wireless alarm through messages and GPRS-Internet in the GSM/GPRS web. In order to achieve the simple and high Real-time system, the μC-Linux system migration was also implemented. 展开更多
关键词 FINGERPRINT sensor SECURITY access Control System ARM WIRELESS ALARM
在线阅读 下载PDF
Mobility Conscious Medium Access Control Scheme for Wireless Sensor Networks: A Conceptual Approach
3
作者 Adeniran Ishola Oluwaranti Tayo Dorcas Obasanya 《Wireless Sensor Network》 2014年第7期129-135,共7页
Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on en... Mobility in Wireless Sensor Network (WSN) presents distinctive challenges in Medium Access Control (MAC) scheme. Numerous MAC protocols for sensor networks assume that sensor nodes are static and focus primarily on energy efficiency. This work seeks to develop an improved mobility conscious medium access control scheme for wireless sensor networks with a view to enhance energy conservation on mobile sensor nodes. On this note, mobility patterns of different scenarios are modelled using Gauss Markov Mobility Model (GMMM) to determine the position and distance of the sensor nodes and how they are correlated in time. 展开更多
关键词 MOBILITY Medium access Control Wireless sensor Networks GAUSS MARKOV MOBILITY Model
在线阅读 下载PDF
基于CP-ABE算法的无线传感器网络访问自动控制 被引量:1
4
作者 冯梅 《自动化与仪表》 2025年第3期133-137,共5页
无线传感器网络安全管理过程中,依靠非对称密钥加密算法实现访问自动控制,需要向每个接收者单独完成消息加密和解密,导致访问控制时间开销较大。因此,提出基于CP-ABE算法的无线传感器网络访问自动控制方法。深入分析无线传感器网络节点... 无线传感器网络安全管理过程中,依靠非对称密钥加密算法实现访问自动控制,需要向每个接收者单独完成消息加密和解密,导致访问控制时间开销较大。因此,提出基于CP-ABE算法的无线传感器网络访问自动控制方法。深入分析无线传感器网络节点和服务器部署情况,结合Merkle哈希树算法,搭建网络安全访问认证架构。根据用户与网络之间的历史交互记录,计算动态用户身份信任度,基于此推导出用户行为属性信任度和信任度范围函数,为不同用户分配对应的访问权限。最后,应用CP-ABE算法展开自动化加解密操作处理,通过系统初始化、属性授权机构初始化、私钥生成、网络信息加密、上传验证5个阶段实现网络访问控制。实验结果表明,在访问用户并发数量为120时,无线传感器网络访问控制平均时间开销仅为475 ms,满足实时性要求。 展开更多
关键词 CP-ABE算法 无线传感器网络 哈希树 访问权限 密钥 自动控制
在线阅读 下载PDF
面向TDMA无线传感器网络的攻击构造与入侵检测方法研究
5
作者 温敏初 梁炜 张嘉麟 《计算机工程》 北大核心 2025年第8期203-214,共12页
无线介质的开放性使得信息安全成为其应用中的挑战性问题之一。时分多址(TDMA)协议是面向工业等时延敏感应用的主要协议。针对TDMA无线传感器网络的时隙调度特征,提出空闲时隙攻击模型、重传时隙攻击模型这2种伪装攻击模型,并针对这2种... 无线介质的开放性使得信息安全成为其应用中的挑战性问题之一。时分多址(TDMA)协议是面向工业等时延敏感应用的主要协议。针对TDMA无线传感器网络的时隙调度特征,提出空闲时隙攻击模型、重传时隙攻击模型这2种伪装攻击模型,并针对这2种攻击模型,从TDMA无线传感器网络自身的传输特点出发,考虑网络传输的周期性及传输基本单元为一个时隙的特点,提出一种基于细粒度时间特征提取的高精度入侵检测方法。首先,利用数据包接收时间、超帧开始时间等信息进行时间维度上的细粒度特征提取,计算传输时隙的位置信息;然后,将位置信息输入无监督模型IF(Isolation Forest)进行训练和学习;最后,对在一个超帧周期内收到的同一个节点的序列号相同的2个数据包进行合法性判断。实验结果表明,所提2种伪装攻击能够逃避现有的入侵检测方法,而所提入侵检测方法可以有效检测出这2种伪装攻击,相较于传统方法,该方法在丢包率为30%时检测成功率提升14.5%。 展开更多
关键词 无线传感器网络 时分多址协议 伪装攻击 入侵检测 细粒度时间特征提取
在线阅读 下载PDF
基于AI的无线传感器网络访问自动控制技术
6
作者 杨少阳 《自动化博览》 2025年第9期39-41,共3页
本文针对智能制造环境下无线传感器网络访问控制面临的实时性、可靠性和安全性挑战,提出了一种基于人工智能的无线传感器网络访问自动控制技术。该技术将强化学习与自适应控制理论相结合,构建了智能化的分布式控制架构,通过状态空间建... 本文针对智能制造环境下无线传感器网络访问控制面临的实时性、可靠性和安全性挑战,提出了一种基于人工智能的无线传感器网络访问自动控制技术。该技术将强化学习与自适应控制理论相结合,构建了智能化的分布式控制架构,通过状态空间建模和最优控制策略实现传感器-控制器-执行器闭环系统的协调控制和故障诊断。实验结果表明,该技术在控制精度、响应时间和系统鲁棒性等关键指标方面均取得了显著改善,验证了其在工业自动化控制中的有效性。 展开更多
关键词 人工智能 无线传感器网络 网络访问控制 自动控制技术
在线阅读 下载PDF
基于随机退避的高密度传感网络突发接入算法
7
作者 张磊 李伊陶 熊兴中 《四川轻化工大学学报(自然科学版)》 2025年第5期81-90,共10页
高密度无线传感器网络的突发业务往往会产生大量随机接入信号,这些信号在短时间内集中接入会造成信道拥堵,进而引发信号碰撞,导致数据丢失、信息延迟及失真。针对这一问题,本研究搭建了高密度无线传感器监测系统模型,并提出一种适用于... 高密度无线传感器网络的突发业务往往会产生大量随机接入信号,这些信号在短时间内集中接入会造成信道拥堵,进而引发信号碰撞,导致数据丢失、信息延迟及失真。针对这一问题,本研究搭建了高密度无线传感器监测系统模型,并提出一种适用于大规模突发业务场景的随机时间退避算法(RandomTimeBackoff,RTB),可快速处理大量节点的退避时间。该算法采用大退避窗口处理信号碰撞,同时提供了计算最佳退避时间范围的方法;通过重传次数缩减退避范围,且为保证退避时间的有效性,计算了重传次数的极限值,以避免因重传次数过大导致退避时间为零的情况。实验结果表明,与PCWRBF算法相比,RTB算法在各项性能指标上均有提升:吞吐量提高2.61%,总传输时间减少2.67%;尤其在降低重传次数方面表现突出,提升幅度达40.14%。这表明RTB算法不仅有助于提高网络传输效率,更在减少数据重传次数方面展现出显著优势。 展开更多
关键词 传感器网络 随机接入 突发业务 高密度网络 随机时间退避
在线阅读 下载PDF
区块链技术支持下多维传感器大数据安全访问控制方法
8
作者 宋蓓蓓 《微型电脑应用》 2025年第9期234-238,243,共6页
多维传感器大数据存在多样性和复杂性,并存在敏感数据的泄露问题,当前,需要多轮加密才能有效解决传感器数据存在的多维度干扰,但效率低下。对此,提出区块链技术支持下的多维传感器大数据安全访问控制方法。利用最优融合集方法对多维传... 多维传感器大数据存在多样性和复杂性,并存在敏感数据的泄露问题,当前,需要多轮加密才能有效解决传感器数据存在的多维度干扰,但效率低下。对此,提出区块链技术支持下的多维传感器大数据安全访问控制方法。利用最优融合集方法对多维传感器数据展开融合处理;通过区块链—属性加密算法实现多维传感器数据的加密,提高数据的安全性;分别计算多维传感器数据及其访问用户的敏感度,根据敏感度展开多维传感器数据的访问控制。实验结果表明,所提方法的安全性高、访问控制效果好。 展开更多
关键词 区块链技术 多维传感器 数据安全访问控制 数据融合 属性加密
在线阅读 下载PDF
基于智能传感器和VB6.0/ACCESS的温湿度测量系统 被引量:2
9
作者 史延龄 《仪表技术》 2010年第5期68-70,共3页
运用VB6.0的串行通信控件,实现计算机与多个智能温湿度传感器的串行通信;在VB6.0环境下,调用ACCESS数据库进行数据保存。该方法实现了分散智能传感器的集中控制、数据的自动采集与自动保存。
关键词 VB6.0 access 串行通信 温湿度传感器
在线阅读 下载PDF
ResearchonsecureaccessmechanismininternetofthingsbasedonTePA 被引量:4
10
作者 杨年鹏 龙昭华 +1 位作者 蒋贵全 马艳 《计算机工程与设计》 CSCD 北大核心 2012年第4期1305-1309,共5页
以椭圆曲线密码算法和三元对等鉴别架构为基础,通过对物联网的基本概念、体系结构的分析,提出了一种基于椭圆曲线签名、三元鉴别的物联网安全接入机制。该机制强化了对物联网中无线传感器节点的鉴别,要求通信的任何一方在通信前必须... 以椭圆曲线密码算法和三元对等鉴别架构为基础,通过对物联网的基本概念、体系结构的分析,提出了一种基于椭圆曲线签名、三元鉴别的物联网安全接入机制。该机制强化了对物联网中无线传感器节点的鉴别,要求通信的任何一方在通信前必须通过其它两方的身份验证。从性能和安全等方面分析了该机制的可行性和可靠性,增强了物联网下对接入访问的安全控制,从而对物联网的建设发展起到了一定的建言作用。 展开更多
关键词 物联网 无线传感器网络 安全接入 三元对等鉴别 椭圆曲线密码
在线阅读 下载PDF
联合WPT和MEC的无线传感网时延优化算法 被引量:1
11
作者 张健 刘鹏博 汤健 《数据采集与处理》 北大核心 2025年第1期163-175,共13页
无线传感网络(Wireless sensor network,WSN)受电池能量有限和计算能力不足的约束,使得电池续航能力成为其广泛部署的瓶颈。本文利用无线电能传输(Wireless power transmission,WPT)和多接入边缘计算(Multi-access edge computing,MEC)... 无线传感网络(Wireless sensor network,WSN)受电池能量有限和计算能力不足的约束,使得电池续航能力成为其广泛部署的瓶颈。本文利用无线电能传输(Wireless power transmission,WPT)和多接入边缘计算(Multi-access edge computing,MEC)技术,在传感器节点能耗受限的情况下,通过联合优化节点卸载决策、无线供电时长和带宽资源分配,最大限度地降低了传感器节点的任务平均完成时延。本文将优化问题建模成混合整数规划问题,并且为了适应复杂动态的信道环境,提出了一种基于柔性动作评价(Soft actor critic,SAC)的时延最小化深度强化学习算法(Deep reinforcement learning delay minimization,DrlDM),将原始优化问题建模成马尔可夫决策过程(Markov decision process,MDP)。仿真结果表明,与3种基线实验相比,本文提出的DrlDM算法平均延迟降低62.11%,显著缩短了节点的任务平均完成时间。 展开更多
关键词 多接入边缘计算 深度强化学习 无线传感网络 无线电能传输 计算卸载
在线阅读 下载PDF
DRAM内置免校准温度传感器设计
12
作者 汪于皓 肖昊 《合肥工业大学学报(自然科学版)》 北大核心 2025年第9期1208-1212,共5页
随着工艺制程的不断微缩,动态随机存储器(dynamic random access memory,DRAM)的集成度持续提高,单颗芯片上存储单元的数目呈指数增长,随之带来的是芯片发热严重和泄漏电流增大等问题,为了实时监测内部温度并控制相应的刷新操作,DRAM需... 随着工艺制程的不断微缩,动态随机存储器(dynamic random access memory,DRAM)的集成度持续提高,单颗芯片上存储单元的数目呈指数增长,随之带来的是芯片发热严重和泄漏电流增大等问题,为了实时监测内部温度并控制相应的刷新操作,DRAM需要在内部集成温度传感器。文章从DRAM的基本结构、工作原理和实际工作中对内置温度传感器的需求出发,研究不同读出架构的集成式温度传感器的优缺点,考虑到感温精度、感温范围、功耗和成本等因素以及DRAM产品规格说明书中对内置温度传感器的要求,设计出一款基于时域读出架构的免校准低功耗温度传感器。采用19 nm的互补金属氧化物半导体(complementary metal oxide semiconductor,CMOS)工艺进行仿真验证,结果表明,免校准的前提下,该温度传感器在0~110℃的感温范围内具有3℃的仿真精度,版图面积为0.189 mm^(2),平均功耗为340.31μW,感温时间为550μs。文章设计的温度传感器满足DRAM对于内置温度传感器的要求,且大大降低了DRAM的生产成本。 展开更多
关键词 动态随机存储器(DRAM) 温度传感器 免校准 双极结型晶体管(BJT) 泄漏电流 刷新
在线阅读 下载PDF
呼吸机空气氧气混合及气路控制工作原理及常见故障分析
13
作者 刘庆涛 张慧勇 《中国医学装备》 2025年第1期158-161,共4页
呼吸机是危重症患者救治的重要医疗设备之一,随着医疗技术的不断发展,呼吸机的结构性能趋于精密化,设备的日常维护和维修保障更加重要。空气氧气混合是呼吸机气体供给的重要组成模块,结构上分为空气接入通路、氧气接入通路和空气氧气混... 呼吸机是危重症患者救治的重要医疗设备之一,随着医疗技术的不断发展,呼吸机的结构性能趋于精密化,设备的日常维护和维修保障更加重要。空气氧气混合是呼吸机气体供给的重要组成模块,结构上分为空气接入通路、氧气接入通路和空气氧气混合增压部分,气路控制的功能是气体流量和压力的控制,是保障安全通气的基础,包括流量控制系统和安全阀系统。结合呼吸机临床应用实际,从维护维修的重点内容着手,分析呼吸机空气氧气混合及气路控制的工作原理,总结常见故障的维修方法,以期为呼吸机的临床服务能力提供技术保障。 展开更多
关键词 呼吸机 空氧混合 氧气通路 空气通路 控制阀 流量传感器
暂未订购
A Survey on Underwater Acoustic Sensor Networks: Perspectives on Protocol Design for Signaling, MAC and Routing 被引量:5
14
作者 Mohammad Sharif-Yazd Mohammad Reza Khosravi Mohammad Kazem Moghimi 《Journal of Computer and Communications》 2017年第5期12-23,共12页
Underwater acoustic sensor networks (UASNs) are often used for environmental and industrial sensing in undersea/ocean space, therefore, these networks are also named underwater wireless sensor networks (UWSNs). Underw... Underwater acoustic sensor networks (UASNs) are often used for environmental and industrial sensing in undersea/ocean space, therefore, these networks are also named underwater wireless sensor networks (UWSNs). Underwater sensor networks are different from other sensor networks due to the acoustic channel used in their physical layer, thus we should discuss about the specific features of these underwater networks such as acoustic channel modeling and protocol design for different layers of open system interconnection (OSI) model. Each node of these networks as a sensor needs to exchange data with other nodes;however, complexity of the acoustic channel makes some challenges in practice, especially when we are designing the network protocols. Therefore based on the mentioned cases, we are going to review general issues of the design of an UASN in this paper. In this regard, we firstly describe the network architecture for a typical 3D UASN, then we review the characteristics of the acoustic channel and the corresponding challenges of it and finally, we discuss about the different layers e.g. MAC protocols, routing protocols, and signal processing for the application layer of UASNs. 展开更多
关键词 ACOUSTIC Communications UNDERWATER ACOUSTIC sensor Networks (UASNs) UNDERWATER Medium access Control (Underwater MAC) UNDERWATER ROUTING Distributed Signal Processing
在线阅读 下载PDF
A Survey on Real-Time MAC Protocols in Wireless Sensor Networks
15
作者 Zheng Teng Ki-Il Kim 《Communications and Network》 2010年第2期104-112,共9页
As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usuall... As wireless sensor network becomes pervasive, new requirements have been continuously emerged. How-ever, the most of research efforts in wireless sensor network are focused on energy problem since the nodes are usually battery-powered. Among these requirements, real-time communication is one of the big research challenges in wireless sensor networks because most of query messages carry time information. To meet this requirement, recently several real-time medium access control protocols have been proposed for wireless sensor networks in the literature because waiting time to share medium on each node is one of main source for end-to-end delay. In this paper, we first introduce the specific requirement of wireless sensor real-time MAC protocol. Then, a collection of recent wireless sensor real-time MAC protocols are surveyed, classified, and described emphasizing their advantages and disadvantages whenever possible. Finally we present a dis-cussion about the challenges of current wireless sensor real-time MAC protocols in the literature, and show the conclusion in the end. 展开更多
关键词 WIRELESS sensor Networks MEDIUM access Control (MAC) REAL-TIME
在线阅读 下载PDF
Media Access with Spatial Reuse for Cooperative Spectrum Sensing
16
作者 Xiao Shao Harry Leib 《Wireless Sensor Network》 2017年第7期205-237,共33页
The increasing interest for wireless communication services and scarcity of radio spectrum resources have created the need for a more flexible and efficient usage of the radio frequency bands. Cognitive Radio (CR) eme... The increasing interest for wireless communication services and scarcity of radio spectrum resources have created the need for a more flexible and efficient usage of the radio frequency bands. Cognitive Radio (CR) emerges as an important trend for a solution to this problem. Spectrum sensing is a crucial function in a CR system. Cooperative spectrum sensing can overcome fading and shadowing effects, and hence increase the reliability of primary user detection. In this paper we consider a system model of a dedicated detect-andforward wireless sensor network (DetF WSN) for cooperative spectrum sensing with k-out-of-n decision fusion in the presence of reporting channels errors. Using this model we consider the design of a spatial reuse media access control (MAC) protocol based on TDMA/OFDMA to resolve conflicts and conserve resources for intra-WSN communication. The influence of the MAC protocol on spectrum sensing performance of the WSN is a key consideration. Two design approaches, using greedy and adaptive simulated annealing (ASA) algorithms, are considered in detail. Performance results assuming a grid network in a Rician fading environment are presented for the two design approaches. 展开更多
关键词 COOPERATIVE SPECTRUM SENSING Wireless sensor Network MEDIA access Spatial REUSE
在线阅读 下载PDF
Efficient Packet Scheduling Technique for Data Merging in Wireless Sensor Networks 被引量:2
17
作者 V.Akila T.Sheela G.Adiline Macriga 《China Communications》 SCIE CSCD 2017年第4期35-46,共12页
Wireless Sensor Networks(WSNs) has become a popular research topic due to its resource constraints. Energy consumption and transmission delay is crucial requirement to be handled to enhance the popularity of WSNs. In ... Wireless Sensor Networks(WSNs) has become a popular research topic due to its resource constraints. Energy consumption and transmission delay is crucial requirement to be handled to enhance the popularity of WSNs. In order to overcome these issues, we have proposed an Efficient Packet Scheduling Technique for Data Merging in WSNs. Packet scheduling is done by using three levels of priority queue and to reduce the transmission delay. Real-time data packets are placed in high priority queue and Non real-time data packets based on local or remote data are placed on other queues. In this paper, we have used Time Division Multiple Access(TDMA) scheme to efficiently determine the priority of the packet at each level and transmit the data packets from lower level to higher level through intermediate nodes. To reduce the number of transmission, efficient data merge technique is used to merge the data packet in intermediate nodes which has same destination node. Data merge utilize the maximum packet size by appending the merged packets with received packets till the maximum packet size or maximum waiting time is reached. Real-time data packets are directly forwarded to the next node without applying data merge. The performance is evaluated under various metrics like packet delivery ratio, packet drop, energy consumption and delay based on changing the number of nodes and transmission rate. Our results show significant reduction in various performance metrics. 展开更多
关键词 wireless sensor networks data aggregation packet scheduling time division multiple access
在线阅读 下载PDF
An IEEE 802.15.4 Based Adaptive Communication Protocol in Wireless Sensor Network: Application to Monitoring the Elderly at Home
18
作者 Juan Lu Adrien Van Den Bossche Eric Campo 《Wireless Sensor Network》 2014年第9期192-204,共13页
Monitoring behaviour of the elderly and the disabled living alone has become a major public health problem in our modern societies. Among the various scientific aspects involved in the home monitoring field, we are in... Monitoring behaviour of the elderly and the disabled living alone has become a major public health problem in our modern societies. Among the various scientific aspects involved in the home monitoring field, we are interested in the study and the proposal of a solution allowing distributed sensor nodes to communicate with each other in an optimal way adapted to the specific application constraints. More precisely, we want to build a wireless network that consists of several short range sensor nodes exchanging data between them according to a communication protocol at MAC (Medium Access Control) level. This protocol must be able to optimize energy consumption, transmission time and loss of information. To achieve this objective, we have analyzed the advantages and the limitations of WSN (Wireless Sensor Network) technologies and communication protocols currently used in relation to the requirements of our application. Then we proposed a deterministic, adaptive and energy saving medium access method based on the IEEE 802.15.4 physical layer and a mesh topology. It ensures the message delivery time with strongly limited collision risk due to the spatial reuse of medium in the two-hop neighbourhood. This proposal was characterized by modelling and simulation using OPNET network simulator. Finally we implemented the proposed mechanisms on hardware devices and deployed a sensors network in real situation to verify the accuracy of the model and evaluate the proposal according to different test configurations. 展开更多
关键词 Wireless sensor Network Medium access Control Quality of Service Energy SAVING Mesh Topology IEEE 802.15.4 Indoor MONITORING APPLICATION
暂未订购
Robust UAV Aided Data Collection for Energy-Efficient Wireless Sensor Network with Imperfect CSI
19
作者 Xiaoying Fu Yi Cen Huilan Zou 《Journal of Computer and Communications》 2021年第5期109-119,共11页
<div style="text-align:justify;"> Due to its air superiority and high mobility, unmanned aerial vehicle (UAV) can obtain better line-of-sight (LoS) link transmission channel. Therefore, UAV assisted da... <div style="text-align:justify;"> Due to its air superiority and high mobility, unmanned aerial vehicle (UAV) can obtain better line-of-sight (LoS) link transmission channel. Therefore, UAV assisted data collection for wireless sensor networks (WSNs) has become an important research direction. This paper intends to minimize the loss of WSNs for the robust data acquisition and communication assisted by UAV under the imperfect channel state information (CSI). On the premise of ensuring the completion of the communication task, we jointly optimize the wake-up schedule of SNs and the flight trajectory of the UAV, by considering the flight speed of the UAV and the sparse access of all sensor nodes (SNs) in WSN. Because the formulated optimization problem is a mixed integer nonconvex problem, we decompose the original problem into the efficient suboptimal solutions to overcome the difficulty of the optimization. Finally, the number of access node corresponding to the optimized operation time and access efficiency is induced for the entire WSN system efficiency improving. The simulation shows the performance gains of our proposed scheme and the influences of the system parameters are analyzed. </div> 展开更多
关键词 UAV Data Collection Wireless sensor Network Trajectory Optimization Sparse access
在线阅读 下载PDF
Hardware/Compiler Memory Protection in Sensor Nodes
20
作者 Lanfranco LOPRIORE 《International Journal of Communications, Network and System Sciences》 2008年第3期235-240,共6页
With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the mic... With reference to sensor node architectures, we consider the problem of supporting forms of memory protection through a hardware/compiler approach that takes advantage of a low-cost protection circuitry inside the microcontroller, interposed between the processor and the storage devices. Our design effort complies with the stringent limitations existing in these architectures in terms of hardware complexity, available storage and energy consumption. Rather that precluding deliberately harmful programs from producing their effects, our solution is aimed at limiting the spread of programming errors outside the memory scope of the running program. The discussion evaluates the resulting protection environment from a number of salient viewpoints that include the implementation of common protection paradigms, efficiency in the distribution and revocation of access privileges, and the lack of a privileged (kernel) mode. 展开更多
关键词 access Control PROTECTION DOMAIN PROTECTION System sensor NODE
暂未订购
上一页 1 2 18 下一页 到第
使用帮助 返回顶部