[图书][B] Green Networking and Communications

S Khan, J Mauri - 2013 - api.taylorfrancis.com
According to the International Telecommunication Union, information and communication
technology (ICT) was emitting 0.83 GtCO2e (gigatons of carbon dioxide equivalent) …

Identity-based trusted authentication in wireless sensor network

YM Yussoff, H Hashim, MD Baba - arXiv preprint arXiv:1207.6185, 2012 - arxiv.org
Secure communication mechanisms in Wireless Sensor Networks (WSNs) have been widely
deployed to ensure confidentiality, authenticity and integrity of the nodes and data. Recently …

Mobile converged networks: framework, optimization, and challenges

T Han, Y Yang, X Ge, G Mao - IEEE Wireless Communications, 2014 - ieeexplore.ieee.org
In this article, a new framework of mobile converged networks is proposed for flexible
resource optimization over multi-tier wireless heterogeneous networks. Design principles …

Study on dynamic monitoring system of high slope based on the internet of things

H Huang, Z Yan, X Zhang, Q Wu, G Zhu… - … on Cloud Computing …, 2016 - ieeexplore.ieee.org
Based on internet of things and communication technology, this paper puts forward the
overall architecture of dynamic monitoring system in the high slope and monitoring …

Efficient sensor node authentication in wireless integrated sensor networks using virtual certificate authority

RP Fulare, AV Sakhare - 2014 Fourth International Conference …, 2014 - ieeexplore.ieee.org
Wireless Sensor Network (WSN) is used for collecting the information from the environment.
WSN consists of large number of Sensor Nodes (SN). To implement security during the …

WISN: Effective authentication by VCA

S Deepthi - 2017 International Conference on I-SMAC (IoT in …, 2017 - ieeexplore.ieee.org
As Wireless Sensor Network (WSN) consists of large number of Sensor Nodes (SN) which
are dynamic and ad-hoc in nature used to transfer data, where providing security place vital …

基于票据的虚拟企业跨异构域认证及密钥协商

饶宇, 张文芳, 王小敏 - 计算机集成制造系统, 2014 - cims-journal.cn
为了满足虚拟企业资源在异构域间的安全有效共享, 提出一个基于访问授权票据的跨异构域认证
及密钥协商方案. 利用基于公钥认证机制的分布式信任模型, 在公钥基础设施域的认证中心证书 …

Fuzzy vault‐based three‐factor authentication and key exchange for 5G‐integrated wireless sensor networks

J Sun, Q Jiang, J Ma, Q Cheng, CL I… - Transactions on …, 2021 - Wiley Online Library
The integration of the wireless sensor networks (WSNs) and the advanced 5G networks has
greatly enriched applications of the Internet of Things. However, the open access to sensor …

An Analytical Model for WSN-MCN Convergence Network Based on Processor Sharing Scheduling

A Swain, AK Ray, PK Swain - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
Advancement in ubiquitous techniques and the need of wide coverage network march
towards convergence of networks. Mobile cellular network (MCN) is the largest network …

Matrix based Hybrid Key Establishment Schemes for Securing the Communication in Group based WSN

A Ullah - 2016 - repository.pastic.gov.pk
Secure key distribution is extremely crucial in commercial and military applications of WSN
and wireless sensor and Actor networks (WSAN) for providing confidentiality to messages …