期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Lightweight Data Aggregation Protocol in Wireless Sensor Networks for the Protection of Ancient Sites
1
作者 Xiaojiang Chen dingyi fang +4 位作者 Xueqing Huang Baoying Liu Xiaoqiong Gong Wenbo Wang Alessio Perrone 《Journal of Sensor Technology》 2011年第4期91-98,共8页
In the application of large-scale ancient site protection, it is necessary to continuously monitor the ambient light, temperature, humidity and so on. However, it is impractical to frequently replace the nodes’ batte... In the application of large-scale ancient site protection, it is necessary to continuously monitor the ambient light, temperature, humidity and so on. However, it is impractical to frequently replace the nodes’ battery in the protected areas. So, the key methods to prolong the network lifetime are to aggregate the collected data and reduce the number of transferring messages. In this paper a Lightweight Data Aggregation Protocol (LDAP) based on the characteristics of the environmental changes in ancient sites is proposed. It has been implemented in the Lab with a dozen of MICAz motes and deployed in the real ancient sites. The result shows that LDAP is effective in reducing the number of transferring packets and satisfies the real application requirements. 展开更多
关键词 Wireless Sensor Networks ANCIENT SITES Network LIFETIME Data AGGREGATION
下载PDF
The New Attribute-Based Generalized Signcryption Scheme
2
作者 Yiliang Han Yincheng Bai +1 位作者 dingyi fang Xiaoyuan Yang 《国际计算机前沿大会会议论文集》 2015年第1期102-103,共2页
An attribute-based generalized signcryption scheme based on bilinear pairing has been proposed. By changing attributes, encryption-only mode, signature-only mode, and signcryption mode can be switch adaptively. It sho... An attribute-based generalized signcryption scheme based on bilinear pairing has been proposed. By changing attributes, encryption-only mode, signature-only mode, and signcryption mode can be switch adaptively. It shows that the scheme achieves the semantic security under the decisional bilinear Diffie- Hellman assumption and achieves the unforgeability under the computational Diffie-Hellman assumption. It is more efficient than traditional way and can be used to secure the big data in networks. 展开更多
关键词 ATTRIBUTE-BASED ENCRYPTION GENERALIZED SIGNCRYPTION DIFFIE-HELLMAN ASSUMPTION Random oracle model Big data
下载PDF
The application of the Internet of Things to animal ecology 被引量:2
3
作者 Songtao GUO Min QIANG +9 位作者 Xiaorui LUAN Pengfei XU Gang HE Xiaoyan YIN Luo XI Xuelin JIN Jianbin SHAO Xiaojiang CHEN dingyi fang Baoguo LI 《Integrative Zoology》 SCIE CSCD 2015年第6期572-578,共7页
For ecologists,understanding the reaction of animals to environmental changes is critical.Using networked sensor technology to measure wildlife and environmental parameters can provide accurate,real-time and comprehen... For ecologists,understanding the reaction of animals to environmental changes is critical.Using networked sensor technology to measure wildlife and environmental parameters can provide accurate,real-time and comprehensive data for monitoring,research and conservation of wildlife.This paper reviews:(i)conventional detection technology;(ii)concepts and applications of the Internet of Things(IoT)in animal ecology;and(iii)the advantages and disadvantages of IoT.The current theoretical limits of IoT in animal ecology are also discussed.Although IoT offers a new direction in animal ecological research,it still needs to be further explored and developed as a theoretical system and applied to the appropriate scientific frameworks for understanding animal ecology. 展开更多
关键词 animal detecting environmental monitoring Internet of Things wireless sensor network
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部