肉体 发表于 2025-3-25 04:33:58

http://reply.papertrans.cn/47/4641/464041/464041_21.png

Rustproof 发表于 2025-3-25 08:09:56

Link-Based Privacy-Preserving Data Aggregation Scheme in Wireless Sensor Networks,a link is proposed in this paper. To be specifically, the data link is formed according to energy consumption and distance. For each round of the data aggregation, nodes within a certain cluster perform data aggregation together by subtracting the base value(given by cluster head) from its real valu

箴言 发表于 2025-3-25 12:14:14

Reversible Authentication of Wireless Sensor Network Based on Prediction-Error Histogram and CRC,hentication groups, and each authentication group is composed of a generator group and a carrier group. Then the cyclical redundancy check (CRC) code of generator group is produced as the authentication information. In the carrier group, using the prediction-error-based histogram shifting algorithm,

COST 发表于 2025-3-25 19:21:01

Heterogeneous Component Model for Architecture of Community Medical Internet of Things,rements. In the face of growing community medical needs, the construction and development of community medical Internet of things is imminent. Through analyzing the existing construction of medical Internet of Things, combined with the community application environment, a heterogeneous component mod

plasma-cells 发表于 2025-3-25 21:58:19

A Novel Grouping-Based WSN Clustering Data Transmission Protocol,ission process and the defects of transmission path after clustering on wireless sensor network (WSN). By calculating the reach probability of data packets, the original data packets are grouped to guarantee data integrity before transmission. Creating multi-path between cluster heads and the base s

conflate 发表于 2025-3-26 02:10:33

An Improved DV-Hop Localization Algorithm via Inverse Distance Weighting Method in Wireless Sensor dom distribution in DV-Hop. Different from the previous results, minimum mean-squared error (MSE) and inverse distance weighting method are adopted to deal with the average one-hop distance in improved algorithm. Improved algorithm and DV-Hop are simulated by MATLAB R2015b, and the results of these

离开可分裂 发表于 2025-3-26 06:29:26

http://reply.papertrans.cn/47/4641/464041/464041_27.png

记成蚂蚁 发表于 2025-3-26 09:03:16

An Inside Look at IoT Malware,ase up to 50.1 billion. Different from traditional security-related areas in which researchers have made many efforts on them for many years, researches on IoT have just started to receive attentions in recent years. The IoT devices are exposing to many security problems, such as weak passwords, bac

Influx 发表于 2025-3-26 14:47:42

http://reply.papertrans.cn/47/4641/464041/464041_29.png

chalice 发表于 2025-3-26 20:14:49

http://reply.papertrans.cn/47/4641/464041/464041_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: Industrial IoT Technologies and Applications; Second EAI Internati Fulong Chen,Yonglong Luo Conference proceedings 2017 ICST Institute for