Computer Science ›› 2007, Vol. 34 ›› Issue (6): 84-87.
Previous Articles Next Articles
Online:
Published:
Abstract: Security threat can happen in a wireless sensor network not only while relaying information to the end-user but also while generating information. So, the conventional view of security based on cryptography and authentication alone is not sufficient for t
Key words: Wireless sensor networks, Data authentication, Reputation, Beta distribution
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2007/V34/I6/84
Cited