English  |  正體中文  |  简体中文  |  全文笔数/总笔数 : 56562/90363 (63%)
造访人次 : 11854614      在线人数 : 108
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library & TKU Library IR team.
搜寻范围 查询小技巧:
  • 您可在西文检索词汇前后加上"双引号",以获取较精准的检索结果
  • 若欲以作者姓名搜寻,建议至进阶搜寻限定作者字段,可获得较完整数据
  • 进阶搜寻

    jsp.display-item.identifier=請使用永久網址來引用或連結此文件: http://tkuir.lib.tku.edu.tw:8080/dspace/handle/987654321/73033

    题名: An Intruder Avoidance Vulnerable Path Adjustment Protocol for Wireless Mobile Sensor Networks
    作者: Shih, Kuei-ping;Li, Chun-chih;Chen, Yen-da
    贡献者: 淡江大學資訊工程學系
    日期: 2009-12
    上传时间: 2011-10-24 11:25:29 (UTC+8)
    出版者: Taipei : Institute of electrical and electronics engineers (IEEE)
    摘要: The paper proposes a protocol to adjust the vulnerable path by using mobile sensor networks. The objective of vulnerable adjustment is to protect some important areas, named TBP (to-be-protected) areas in the paper, from being attacked. In the paper, Voronoi diagram is utilized to And a vulnerable path, which is a path that an intruder may pass through. While the vulnerable path passes over a TBP area, a backward tracing and critical sets selection schemes are used to move the fewest number of sensors such that the vulnerable path can be changed and the new vulnerable path will not pass over the TBP area. Moreover, a moving schemes is proposed to decide where mobile sensors shall move. Since sensor movement is the major resource of energy consumption, thus, in order not to cause much movement, the proposed mechanism can move the fewest number of sensors with the shortest distance. Simulation results also verify the advantages of the proposed mechanism.
    關聯: Proceedings of the 2009 joint conferences on pervasive computing, pp.373-376
    DOI: 10.1109/JCPC.2009.5420201
    显示于类别:[資訊工程學系暨研究所] 會議論文


    档案 描述 大小格式浏览次数
    An Intruder Avoidance Vulnerable Path.pdf3542KbAdobe PDF262检视/开启



    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library & TKU Library IR teams. Copyright ©   - 回馈