English  |  正體中文  |  简体中文  |  全文筆數/總筆數 : 49378/84106 (59%)
造訪人次 : 7369788      線上人數 : 65
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜尋範圍 查詢小技巧:
  • 您可在西文檢索詞彙前後加上"雙引號",以獲取較精準的檢索結果
  • 若欲以作者姓名搜尋,建議至進階搜尋限定作者欄位,可獲得較完整資料
  • 進階搜尋
    請使用永久網址來引用或連結此文件: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/73033

    題名: An Intruder Avoidance Vulnerable Path Adjustment Protocol for Wireless Mobile Sensor Networks
    作者: Shih, Kuei-ping;Li, Chun-chih;Chen, Yen-da
    貢獻者: 淡江大學資訊工程學系
    日期: 2009-12
    上傳時間: 2011-10-24 11:25:29 (UTC+8)
    出版者: Taipei : Institute of electrical and electronics engineers (IEEE)
    摘要: The paper proposes a protocol to adjust the vulnerable path by using mobile sensor networks. The objective of vulnerable adjustment is to protect some important areas, named TBP (to-be-protected) areas in the paper, from being attacked. In the paper, Voronoi diagram is utilized to And a vulnerable path, which is a path that an intruder may pass through. While the vulnerable path passes over a TBP area, a backward tracing and critical sets selection schemes are used to move the fewest number of sensors such that the vulnerable path can be changed and the new vulnerable path will not pass over the TBP area. Moreover, a moving schemes is proposed to decide where mobile sensors shall move. Since sensor movement is the major resource of energy consumption, thus, in order not to cause much movement, the proposed mechanism can move the fewest number of sensors with the shortest distance. Simulation results also verify the advantages of the proposed mechanism.
    關聯: Proceedings of the 2009 joint conferences on pervasive computing, pp.373-376
    DOI: 10.1109/JCPC.2009.5420201
    顯示於類別:[資訊工程學系暨研究所] 會議論文


    檔案 描述 大小格式瀏覽次數
    An Intruder Avoidance Vulnerable Path.pdf3542KbAdobe PDF183檢視/開啟



    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回饋