期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Secure Localization Based Authentication (SLA) Strategy for Data Integrity in WNS 被引量:1
1
作者 V.Manikandan M.Sivaram +2 位作者 Amin Salih Mohammed V.Porkodi K.Shankar 《Computers, Materials & Continua》 SCIE EI 2021年第6期4005-4018,共14页
Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locatio... Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locations.To ensure reliability,prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs.Moreover,these models are affected by crucial denial of service(DoS)attacks,where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs.Here,secure localization based authentication(SLA)is presented to fight against DoS attack,and to fulfil the need of reliability and authentication.By examining state information,SLA projects a trust model to enhance efficacy of data delivery.Indeed,of the prevailing opportunistic protocols,SLA guarantees data integrity by modelling a trust based authentication,providing protection against DoS attackers and diminishing computational costs.Specifically,this model acts as a verification strategy to accelerate?attackers and to handle isolation.This strategy helps SLA in eliminating duplicate transmission and by continuous verification that results from conventional opportunistic routing.Simulation is performed in a MATLAB environment that offers authentic and reliable delivery by consuming approximately 50%of the cost in contrast to other approaches.The anticipated model shows better trade off in comparison to the prevailing ones. 展开更多
关键词 Wireless sensor networks opportunistic routing secure localization based authentication denial of service computational cost
下载PDF
Evaluation on Tourism Ecological Security in Nature Heritage Sites——Case of Kanas Nature Reserve of Xinjiang,China 被引量:13
2
作者 LIU Xuling YANG Zhaoping +1 位作者 DI Feng CHEN Xuegang 《Chinese Geographical Science》 SCIE CSCD 2009年第3期265-273,共9页
The nature heritages are the precious legacy of nature with outstanding scientific and aesthetic value. They are quite different from other common ecotourism areas, because of its original and unique system, sensitive... The nature heritages are the precious legacy of nature with outstanding scientific and aesthetic value. They are quite different from other common ecotourism areas, because of its original and unique system, sensitive and vulnerable landscape, and peripheral cultural features. Therefore, the tourism development in the nature heritage sites should be on the premise of ecological security. The evaluation index system of tourism ecological security in nature heritage sites was constructed in this article by AHP and Delphi methods, including nature ecological security, landscape visual security and local culture ecological security, and the security thresholds of indices were also established. In the indices' weights of the evaluation model, the nature ecological security ranked the highest, followed by tourist landscape visual security and culture ecological security, which reflected the influence degree of the limited factor to tourism ecological security. Then, this paper carried out an empirical study of Kanas of Xinjiang Uygur Autonomous Region, China, which has the potential to be the World Nature Heritage. On the basis of the data attained from survey and observation on the spot, as well as questionnaire answered by tourists and local communities, the ecological security status in Kanas was evaluated. The result showed that the status of Kanas tourism ecological security was better, but there had some limiting factors. Lastly, effective measures were put forward to ensure its ecological security. 展开更多
关键词 nature heritage TOURISM ecological security nature ecological security landscape visual security local culture ecological security KANAS
下载PDF
Scheme of Rogue AP detection in managed WLAN based on AP's location
3
作者 Kwontaek Lim Jiawei Shao +1 位作者 Jonghoon Lee Souhwan Jung 《Journal of Measurement Science and Instrumentation》 CAS 2012年第4期370-373,共4页
A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a ... A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a smartphone,which is compared with the database located in a remote server.The proposed scheme can detect not only fake access point(Fake AP)but also Evil Twin AP.It can be a user-oriented solution to detecting Rogue AP threats,and users can use it flexibly. 展开更多
关键词 rogue access point(Rogue AP) wireless local area network(WLAN) security Evil Twin attacks
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部