期刊文献+
共找到123篇文章
< 1 2 7 >
每页显示 20 50 100
Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks 被引量:4
1
作者 Weidong Fang Wuxiong Zhang +3 位作者 Wei Yang Zhannan Li Weiwei Gao Yinxuan Yang 《Digital Communications and Networks》 SCIE CSCD 2021年第4期470-478,共9页
The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how... The single planar routing protocol has a slow convergence rate in the large-scale Wireless Sensor Network(WSN).Although the hierarchical routing protocol can effectively cope with large-scale application scenarios,how to elect a secure cluster head and balance the network load becomes an enormous challenge.In this paper,a Trust Management-based and Low Energy Adaptive Clustering Hierarchy protocol(LEACH-TM)is proposed.In LEACH-TM,by using the number of dynamic decision cluster head nodes,residual energy and density of neighbor nodes,the size of the cluster can be better constrained to improve energy efficiency,and avoid excessive energy consumption of a node.Simultaneously,the trust management scheme is introduced into LEACH-TM to defend against internal attacks.The simulation results show that,compared with LEACH-SWDN protocol and LEACH protocol,LEACH-TM outperforms in prolonging the network lifetime and balancing the energy consumption,and can effectively mitigate the influence of malicious nodes on cluster head selection,which can greatiy guarantee the security of the overall network. 展开更多
关键词 Internet of things wireless sensor network Secure routing protocol Trust management
在线阅读 下载PDF
Comprehensive Analysis of Secure Data Aggregation Scheme for Industrial Wireless Sensor Network
2
作者 Weidong Fang Wuxiong Zhang +3 位作者 QianQian Zhao Xiaohong Ji Wei Chen Biruk Assefa 《Computers, Materials & Continua》 SCIE EI 2019年第8期583-599,共17页
As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protoco... As an Industrial Wireless Sensor Network(IWSN)is usually deployed in a harsh or unattended environment,the privacy security of data aggregation is facing more and more challenges.Currently,the data aggregation protocols mainly focus on improving the efficiency of data transmitting and aggregating,alternately,the aim at enhancing the security of data.The performances of the secure data aggregation protocols are the trade-off of several metrics,which involves the transmission/fusion,the energy efficiency and the security in Wireless Sensor Network(WSN).Unfortunately,there is no paper in systematic analysis about the performance of the secure data aggregation protocols whether in IWSN or in WSN.In consideration of IWSN,we firstly review the security requirements and techniques in WSN data aggregation in this paper.Then,we give a holistic overview of the classical secure data aggregation protocols,which are divided into three categories:hop-by-hop encrypted data aggregation,end-to-end encrypted data aggregation and unencrypted secure data aggregation.Along this way,combining with the characteristics of industrial applications,we analyze the pros and cons of the existing security schemes in each category qualitatively,and realize that the security and the energy efficiency are suitable for IWSN.Finally,we make the conclusion about the techniques and approach in these categories,and highlight the future research directions of privacy preserving data aggregation in IWSN. 展开更多
关键词 Industrial wireless sensor network wireless sensor network cyber security secure data aggregation protocol
在线阅读 下载PDF
Trust Based Energy Aware Greedy Perimeter Stateless Routing for Wireless Sensor Networks 被引量:3
3
作者 P.Samundiswary M.Pavan Kumar P.Dananjayan 《通讯和计算机(中英文版)》 2011年第10期848-854,共7页
Sensor networks are composed of large number of densely deployed sensor nodes.Nodes of sensor networks are usually powered by batteries.Sensor nodes need to work in a physically insecure environment.The nodes are susc... Sensor networks are composed of large number of densely deployed sensor nodes.Nodes of sensor networks are usually powered by batteries.Sensor nodes need to work in a physically insecure environment.The nodes are susceptible to various types of active attacks namely selective forwarding and sinkhole attacks in such environment.These attacks infuse malevolent packets by compromising the node.Geographical routing protocols of wireless sensor networks have been developed without considering the security and energy aspects against these attacks.In this paper,a secured routing protocol named trust based energy aware greedy perimeter stateless routing protocol(TEGPSR)is proposed for mobile sensor networks by incorporating trust based mechanism in energy aware greedy perimeter stateless routing protocol(EGPSR).Simulation results prove that TEGPSR outperforms the EGPSR by reducing overhead and improving the delivery ratio of the networks. 展开更多
关键词 wireless sensor networks compromised nodes sinkhole attacks GPSR protocol secured GPSR protocol.
在线阅读 下载PDF
Enhanced Metaheuristics with Trust Aware Route Selection for Wireless Sensor Networks
4
作者 A.Francis Saviour Devaraj T.Satyanarayana Murthy +3 位作者 Fayadh Alenezi E.Laxmi Lydia Mohamad Adzhar Md Zawawi Mohamad Khairi Ishak 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1431-1445,共15页
Recently,a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks(WSN).In routing,the trust system includes or avoids nodes related to the estimated trust values in t... Recently,a trust system was introduced to enhance security and cooperation between nodes in wireless sensor networks(WSN).In routing,the trust system includes or avoids nodes related to the estimated trust values in the routing function.This article introduces Enhanced Metaheuristics with Trust Aware Secure Route Selection Protocol(EMTA-SRSP)for WSN.The presented EMTA-SRSP technique majorly involves the optimal selection of routes in WSN.To accomplish this,the EMTA-SRSP technique involves the design of an oppositional Aquila optimization algorithm to choose safe routes for data communication.For the clustering process,the nodes with maximum residual energy will be considered cluster heads(CHs).In addition,the OAOA technique gets executed to choose optimal routes based on objective functions with multiple parameters such as energy,distance,and trust degree.The experimental validation of the EMTA-SRSP technique is tested,and the results exhibited a better performance of the EMTA-SRSP technique over other approaches. 展开更多
关键词 security wireless sensor networks trust factor routing protocol PRIVACY
在线阅读 下载PDF
Research on Beta Trust Model of Wireless Sensor Networks Based on Energy Load Balancing
5
作者 Danwei Chen Xizhou Yu Xianghui Dong 《Wireless Sensor Network》 2010年第5期373-380,共8页
This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inte... This paper proposed beta trust model based on energy load balancing combines the recent achievements of the trust models in distributed networks, together with the characteristics of wireless sensor networks. The inter-node trust relation is established after an overall evaluation of node trust value based on the monitor results of the node packets forwarding behavior conducted by inter-node collaboration. Due to the node energy limitation in wireless sensor networks, energy load balancing mechanism is applied to prolong the node survival time. And the redundant routing protocol involves the presented trust model to develop the novel trust routing protocol of beta trust model based on energy load balancing. Simulation performance demonstrates that the beta trust model based on energy load balancing outperforms current schemes in energy consumption. 展开更多
关键词 wireless sensor networks BETA TRUST Model TRUST ROUTING protocol network security TRUST Evaluation
在线阅读 下载PDF
NHRPA:a novel hierarchical routing protocol algorithm for wireless sensor networks 被引量:1
6
作者 CHENG Hong-bing YANG Geng HU Su-jun 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第3期75-81,共7页
Considering severe resources constraints and security threat hierarchical routing protocol algorithm. The proposed routing of wireless sensor networks (WSN), the article proposed a novel protocol algorithm can adopt... Considering severe resources constraints and security threat hierarchical routing protocol algorithm. The proposed routing of wireless sensor networks (WSN), the article proposed a novel protocol algorithm can adopt suitable routing technology for the nodes according to the distance of nodes to the base station, density of nodes distribution, and residual energy of nodes. Comparing the proposed routing protocol algorithm with simple direction diffusion routing technology, cluster-based routing mechanisms, and simple hierarchical routing protocol algorithm through comprehensive analysis and simulation in terms of the energy usage, packet latency, and security in the presence of node protocol algorithm is more efficient for wireless sensor networks. compromise attacks, the results show that the proposed routing 展开更多
关键词 wireless sensor networks (WSN) routing protocol network security
原文传递
Deep Auto-Encoder Based Intelligent and Secure Time Synchronization Protocol(iSTSP)for Security-Critical Time-Sensitive WSNs
7
作者 Ramadan Abdul-Rashid Mohd Amiruddin Abd Rahman Abdulaziz Yagoub Barnawi 《Computer Modeling in Engineering & Sciences》 2025年第9期3213-3250,共38页
Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade... Accurate time synchronization is fundamental to the correct and efficient operation of Wireless Sensor Networks(WSNs),especially in security-critical,time-sensitive applications.However,most existing protocols degrade substantially under malicious interference.We introduce iSTSP,an Intelligent and Secure Time Synchronization Protocol that implements a four-stage defense pipeline to ensure robust,precise synchronization even in hostile environments:(1)trust preprocessing that filters node participation using behavioral trust scoring;(2)anomaly isolation employing a lightweight autoencoder to detect and excise malicious nodes in real time;(3)reliability-weighted consensus that prioritizes high-trust nodes during time aggregation;and(4)convergence-optimized synchronization that dynamically adjusts parameters using theoretical stability bounds.We provide rigorous convergence analysis including a closed-form expression for convergence time,and validate the protocol through both simulations and realworld experiments on a controlled 16-node testbed.Under Sybil attacks with five malicious nodes within this testbed,iSTSP maintains synchronization error increases under 12%and achieves a rapid convergence.Compared to state-ofthe-art protocols like TPSN,SE-FTSP,and MMAR-CTS,iSTSP offers 60%faster detection,broader threat coverage,and more than 7 times lower synchronization error,with a modest 9.3%energy overhead over 8 h.We argue this is an acceptable trade-off for mission-critical deployments requiring guaranteed security.These findings demonstrate iSTSP’s potential as a reliable solution for secure WSN synchronization and motivate future work on large-scale IoT deployments and integration with energy-efficient communication protocols. 展开更多
关键词 Time-sensitive wireless sensor networks(TS-WSNs) secure time synchronization protocol trust-based authentication autoencoder model deep learning malicious node detection Internet of Things energyefficient communication protocols
在线阅读 下载PDF
SPINS安全框架协议研究 被引量:10
8
作者 程宏兵 王江涛 杨庚 《计算机科学》 CSCD 北大核心 2006年第8期106-108,143,共4页
无线传感器网络(WSN)是一种新形式的网络,与传统的有线网络和一般的无线网络有较大的差异。论文在阐述了无线传感器网络(WSN)及其安全问题的同时,重点讨论了依赖基站的安全框架协议———SPINS并对其一些缺陷提出了一些改进方法,最后对S... 无线传感器网络(WSN)是一种新形式的网络,与传统的有线网络和一般的无线网络有较大的差异。论文在阐述了无线传感器网络(WSN)及其安全问题的同时,重点讨论了依赖基站的安全框架协议———SPINS并对其一些缺陷提出了一些改进方法,最后对SPINS协议具体实现时所需的研究问题进行了展望。 展开更多
关键词 无线传感器网络 网络安全 spins协议
在线阅读 下载PDF
基于SPINS的无线传感器网络低能耗安全路由协议 被引量:1
9
作者 彭志娟 王汝传 《计算机应用》 CSCD 北大核心 2010年第5期1149-1152,共4页
LEACH协议是一种基于分簇结构和分层技术的重要的无线传感器网络路由协议,其簇建立过程容易遭受身份伪造、laptop型攻击等。基于SPINS设计了低能耗安全路由协议,使用μTESLA思想认证广播包,借助SNEP协议为簇头和其簇成员节点分配认证密... LEACH协议是一种基于分簇结构和分层技术的重要的无线传感器网络路由协议,其簇建立过程容易遭受身份伪造、laptop型攻击等。基于SPINS设计了低能耗安全路由协议,使用μTESLA思想认证广播包,借助SNEP协议为簇头和其簇成员节点分配认证密钥,节点验证簇头身份和链路可达后方可加入簇。协议实现了不同类型节点之间通信的机密性、完整性、新鲜性、身份和链路双向性认证等安全目标。基于NS2的仿真结果表明,由于基站和簇头节点承担了与安全相关的较多任务,普通节点的能耗并未明显增加。 展开更多
关键词 无线传感器网络 LEACH协议 安全路由 低能耗 NS2
在线阅读 下载PDF
无线传感器网络SPINS安全协议分析与改进 被引量:5
10
作者 彭志娟 王汝传 孙力娟 《无线通信技术》 2007年第1期14-16,21,共4页
针对传感器网络不仅有更多的攻击方式,而且可以采用的防御手段也极为有限的问题,文章从安全协议的设计角度出发阐述了无线传感器网络存在的安全问题并有针对性地提出了解决方法。在详细分析SPINS[1]协议安全特性的基础上指出了该协议尚... 针对传感器网络不仅有更多的攻击方式,而且可以采用的防御手段也极为有限的问题,文章从安全协议的设计角度出发阐述了无线传感器网络存在的安全问题并有针对性地提出了解决方法。在详细分析SPINS[1]协议安全特性的基础上指出了该协议尚存的安全问题,并对协议进行了有效的改进。 展开更多
关键词 无线传感器网络 安全 路由协议 spins协议
原文传递
A NEW PRIVACY-PRESERVING EUCLID-DISTANCE PROTOCOL AND ITS APPLICATIONS IN WSNS
11
作者 Chen Ping Ji Yimu +2 位作者 Wang Ruchuan Huang Haiping Zhang Dan 《Journal of Electronics(China)》 2013年第2期190-197,共8页
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-... Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side. 展开更多
关键词 Secure multi-party computation PRIVACY-PRESERVING Euclid-distance protocol wireless sensor networks (WSNs) Density-Based Clustering protocol (DBCP)
在线阅读 下载PDF
基于可信基站的SPINS协议研究与改进 被引量:4
12
作者 朱磊 吴灏 王清贤 《计算机应用研究》 CSCD 北大核心 2010年第6期2331-2334,共4页
SPINS安全协议基于可信基站,为无线传感器网络数据传输提供了一套安全的解决方案。通过分析SPINS协议,指出其中存在的不足,并对其进行了三方面的改进,即引入全局密钥、支持网络扩展和加入密钥更新机制。分析表明,改进的方案具有较好的... SPINS安全协议基于可信基站,为无线传感器网络数据传输提供了一套安全的解决方案。通过分析SPINS协议,指出其中存在的不足,并对其进行了三方面的改进,即引入全局密钥、支持网络扩展和加入密钥更新机制。分析表明,改进的方案具有较好的扩展性,能有效支持路由信息的认证,新的密钥更新机制在一定程度上增加了安全性。 展开更多
关键词 无线传感器网络 安全 spins协议 网络扩展 密钥更新
在线阅读 下载PDF
WSN中的SPINS协议的改进研究
13
作者 苏耀鑫 高秀峰 +1 位作者 卢昱 乔文欣 《计算机与数字工程》 2018年第4期793-796,827,共5页
在当前信息发展飞速的时代,无线传感器网络作为一种新型的应用型网络,已经在很多领域得到了广泛应用。安全问题成为制约无线传感器网络发展的关键。在阐述目前无线传感器网络的自身特点以及安全需求的基础上,重点介绍了安全框架协议SPI... 在当前信息发展飞速的时代,无线传感器网络作为一种新型的应用型网络,已经在很多领域得到了广泛应用。安全问题成为制约无线传感器网络发展的关键。在阐述目前无线传感器网络的自身特点以及安全需求的基础上,重点介绍了安全框架协议SPINS,针对子协议SNEP本身存在的不足提出了相应的改进方案。通过分析可知,该方案可降低基站依赖性、防范DoS攻击,并且对基站的计算、存储需求降低,网络内节点计算与存储开销没有明显增加,可扩展性好。 展开更多
关键词 无线传感器网络 网络安全 spins协议
在线阅读 下载PDF
WSN安全协议SPINS的研究与改进
14
作者 张巧静 杨宇航 《通信技术》 2010年第6期117-119,共3页
无线传感器网络是一种新的应用型网络,被认为是未来改变世界的十大技术之首,有着广阔的应用前景。近年来,随着无线传感器网络受到越来越多的关注与应用,其安全问题也变得越来越重要。首先分析了无线传感器网络的特点,并在其基础上讨论... 无线传感器网络是一种新的应用型网络,被认为是未来改变世界的十大技术之首,有着广阔的应用前景。近年来,随着无线传感器网络受到越来越多的关注与应用,其安全问题也变得越来越重要。首先分析了无线传感器网络的特点,并在其基础上讨论了传感器网络的易受的安全威胁及安全需求,然后重点研究了SPINS安全协议,并针对其依赖基站的弱点提出了一种变换基站的改进方案。 展开更多
关键词 无线传感器网络 安全威胁 spins协议 基站变换
原文传递
Classification and Review of Security Schemes in Mobile Computing
15
作者 Sathish Alampalayam Kumar 《Wireless Sensor Network》 2010年第6期419-440,共22页
In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Net... In this paper, we present the classification and review of security schemes in mobile computing system. We classify these schemes based on types the infrastructure used in the mobile computing system-Mobile Ad Hoc Networks (MANET) and Mobile Agent model. Mobile Ad Hoc Networks are pervasive, ubiquitous and without any centralized authority. These unique characteristics, combined with ever-increasing security threats, demand solutions in securing ad hoc networks prior to their deployment in commercial and military applications. This paper reviews the prevailing mobile ad hoc network security threats, the existing solution schemes, their limitations and open research issues. We also explain the Intrusion detection and response technique as an alternate method to protect the MANET based mobile computing systems and their approaches. A literature review of important existing Intrusion Detection approaches and Intrusion Response Approaches for MANET is also presented. This paper also presents the limitations of existing Intrusion Detection and Response Approaches for MANET and open research issues in providing MANET security. With respect to Mobile Agent based mobile computing system, we have presented the classification of various types of security attacks in Mobile Agent based model and presented the security solutions for those type of attacks proposed by the various schemes and the open research issues in providing security for Mobile Agent based mobile computing system. Such classification enhances the understanding of the proposed security schemes in the mobile computing system, assists in the development and enhancement of schemes in the future and helps in choosing an appropriate scheme while implementing a mobile computing system. 展开更多
关键词 wireless sensor networks BETA TRUST Model TRUST ROUTING protocol network security TRUST Evaluation
在线阅读 下载PDF
无线传感器网络中分簇安全路由协议保密通信方法的能效研究 被引量:31
16
作者 龙昭华 龚俊 +2 位作者 王波 秦晓焕 刘达明 《电子与信息学报》 EI CSCD 北大核心 2015年第8期2000-2006,共7页
保密通信方法研究的是如何保证路由信息在传输的过程中的安全性,是无线传感器网络中的核心技术之一。针对现阶段大多无线传感器网络路由协议都存在路由安全性问题,该文从均衡能耗的角度出发,引入保密通信协议(SCP)保密通信方法,提出一... 保密通信方法研究的是如何保证路由信息在传输的过程中的安全性,是无线传感器网络中的核心技术之一。针对现阶段大多无线传感器网络路由协议都存在路由安全性问题,该文从均衡能耗的角度出发,引入保密通信协议(SCP)保密通信方法,提出一种能耗均衡的保密通信协议,并对该协议的安全方案进行了分析。然后对协议的性能进行了仿真,结果证明了该协议在能耗和安全性上的性能和利用价值。 展开更多
关键词 无线传感器网络 保密通信方法 安全 保密通信协议
在线阅读 下载PDF
无线传感器网络安全协议的研究 被引量:12
17
作者 王东安 张方舟 +2 位作者 秦刚 南凯 阎保平 《计算机工程》 EI CAS CSCD 北大核心 2005年第21期10-13,共4页
介绍了无线传感器网络的体系结构,以及传感器网络的应用前景。分析和总结了无线传感器网络的安全问题。还介绍了一种适用于无线传感器网络的安全协议:SPINS,并对其中的密钥管理进行改进,引入了一种低能耗的密钥管理协议。最后阐述了下... 介绍了无线传感器网络的体系结构,以及传感器网络的应用前景。分析和总结了无线传感器网络的安全问题。还介绍了一种适用于无线传感器网络的安全协议:SPINS,并对其中的密钥管理进行改进,引入了一种低能耗的密钥管理协议。最后阐述了下一步的工作重点。 展开更多
关键词 无线传感器网络 低功耗 安全协议
在线阅读 下载PDF
若干无线传感器网络路由协议比较研究 被引量:41
18
作者 郑增威 吴朝晖 《计算机工程与设计》 CSCD 2003年第9期28-31,共4页
无线传感器网络作为计算、通信和传感器3项技术相结合的产物,目前成为计算机科学领域一个活跃的研究分支。结合近年来国外的研究成果,着重从路由协议方面介绍无线传感器网络的研究现状,比较分析了LEACH和SPN等多种路由协议,指出了各自... 无线传感器网络作为计算、通信和传感器3项技术相结合的产物,目前成为计算机科学领域一个活跃的研究分支。结合近年来国外的研究成果,着重从路由协议方面介绍无线传感器网络的研究现状,比较分析了LEACH和SPN等多种路由协议,指出了各自的特色。 展开更多
关键词 路由协议 点对点通信模式 无线传感器网络 数据融合 数据处理 数据采集
在线阅读 下载PDF
基于无线传感器网络路由协议的安全机制研究 被引量:15
19
作者 覃伯平 周贤伟 +1 位作者 杨军 李晓勤 《传感技术学报》 CAS CSCD 北大核心 2006年第4期1276-1278,1283,共4页
针对无线传感器网络中现有部分路由协议考虑安全需求不够的问题,提出一种基于路由协议的安全机制(RPSS)。该安全机制把节省节点能耗和增强路由安全性作为设计目标,采用低能量密钥管理方案和减少转发节点计算量的方法,有效地降低节点的... 针对无线传感器网络中现有部分路由协议考虑安全需求不够的问题,提出一种基于路由协议的安全机制(RPSS)。该安全机制把节省节点能耗和增强路由安全性作为设计目标,采用低能量密钥管理方案和减少转发节点计算量的方法,有效地降低节点的耗能。通过预设密钥和证书,在路由建立阶段增加安全机制,得到一种较优的安全路由方案。经过安全性分析和性能分析,该安全机制可防御虚假路由信息、Sybile和确认欺骗等攻击;还具有适用面广、耗能低和计算量小的优势。 展开更多
关键词 无线传感器网络 路由协议 安全机制
在线阅读 下载PDF
无线传感器网络及其安全问题 被引量:13
20
作者 李晖 彭志威 陈克非 《中兴通讯技术》 2004年第B10期30-34,共5页
文章认为随着无线通信技术和电子器件技术的快速发展,低成本、低功耗、多功能的无线传感器的开发和广泛应用成为可能,但在大多数应用环境中用户对无限传感器网络的安全能力有很高的要求,因此安全成为制约无限传感器网络广泛应用的关键... 文章认为随着无线通信技术和电子器件技术的快速发展,低成本、低功耗、多功能的无线传感器的开发和广泛应用成为可能,但在大多数应用环境中用户对无限传感器网络的安全能力有很高的要求,因此安全成为制约无限传感器网络广泛应用的关键。为此文章探讨了无线传感器网络协议栈各层所面临的安全问题,对解决这些安全问题的关键技术进行了讨论。 展开更多
关键词 无线传感器网络 安全问题 低功耗 协议栈 用户 无线通信技术 关键技术 电子器件 快速发展 低成本
在线阅读 下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部