Loading...

Preserving Source Location Privacy for Energy Harvesting WSNs

Fog (From cOre to edGe) computing employs a huge number of wireless embedded devices to enable end users with anywhere-anytime-to-anything connectivity. Due to their operating nature, wireless sensor nodes often work unattended, and hence are exposed to a variety of attacks. Preserving source-locati...

Fuld beskrivelse

Na minha lista:
Bibliografiske detaljer
Udgivet i:Sensors (Basel)
Main Authors: Huang, Changqin, Ma, Ming, Liu, Yuxin, Liu, Anfeng
Format: Artigo
Sprog:Inglês
Udgivet: MDPI 2017
Fag:
Online adgang:https://ncbi.nlm.nih.gov/pmc/articles/PMC5421684/
https://ncbi.nlm.nih.gov/pubmed/28358341
https://ncbi.nlm.nih.govhttp://dx.doi.org/10.3390/s17040724
Tags: Tilføj Tag
Ingen Tags, Vær først til at tagge denne postø!