物聯網安全機制之研究
SJ Huang - 臺中科技大學資訊工程系碩士班學位論文, 2020 - airitilibrary.com
… Via IoT (Internet of Things), devices used in our daily life can communicate with each other.
… found security flaws damage Rao and Prema’s scheme are shown. On the other hand, IoT …
… found security flaws damage Rao and Prema’s scheme are shown. On the other hand, IoT …
[PDF][PDF] 面向软件定义架构的无线传感器网络
董玮, 陈共龙, 曹晨红, 罗路遥, 高艺 - 计算机学报, 2017 - cjc.ict.ac.cn
… of security already exists in traditional sensor networks as … software-defined sensor network
architecture can greatly … interests include Internet of Things and sensor networks, network …
architecture can greatly … interests include Internet of Things and sensor networks, network …
[HTML][HTML] 基於輕量化硬體可信賴代理人之感測網路遠程證實方法
PH Yang - 2018 - ir.lib.ncu.edu.tw
… protocol enabling attestation for sensor networks," In Proceedings of the 7th International
ICST Conference on Security and Privacy in Communication Networks, SecureComm ′11, Vol…
ICST Conference on Security and Privacy in Communication Networks, SecureComm ′11, Vol…
運用IoT 平台評估程序改善IoT 運作效益
賴森堂 - 電腦稽核, 2020 - airitilibrary.com
… According to relevant literature and reports, the security and privacy issues of the IoT are
currently the most valued, followed by network transmission and computing efficiency, device …
currently the most valued, followed by network transmission and computing efficiency, device …
Shodan 為基礎的IoT 安全等級與防護機制
賴森堂 - 電腦稽核, 2020 - airitilibrary.com
… the security of IoT devices, making IoT security issues a security threat. In the IoT era, in
order to protect the personal and sensitive data of the people, this paper uses the IoT network …
order to protect the personal and sensitive data of the people, this paper uses the IoT network …
具有休眠/监听机制的无线传感器网络中SIR 病毒传播研究.
蒋路茸, 戴燕云, 潘杭驿, 徐巧玉… - Experimental …, 2021 - search.ebscohost.com
… Abstract: Aiming at the security problem of wireless sensor network under virus attack, … of
“Computer networks and information security” and “Introduction to the Internet of things”, which …
“Computer networks and information security” and “Introduction to the Internet of things”, which …
基于物联网技术的智能家居系统
严萍, 张兴敢, 柏业超, 杜仲林 - 南京大学学报(自然科学版), 2015 - jns.nju.edu.cn
… A secure digital memory card is used to record every single event. The front end sensors
connect to the control terminal over ZigBec network … strategy for the Internet of things. Journal on …
connect to the control terminal over ZigBec network … strategy for the Internet of things. Journal on …
[HTML][HTML] 基於合作賽局理論的LED 照明調控機制
CW Yu - 2020 - ir.lib.ncu.edu.tw
… , first we use a variety of IoT sensors such as color sensors and electronic meters on the …
sensed data to the Node-RED IoT platform. The IoT management server creates and stores the …
sensed data to the Node-RED IoT platform. The IoT management server creates and stores the …
[PDF][PDF] 基于无证书公钥体制的层簇式WSN 密钥管理方案
周大伟, 魏国珩, 张焕国 - 北京工业大学学报, 2016 - journal.bjut.edu.cn
… Research on military internet of things [J]. … Watchdog-LEACH: a new method based on
LEACH protocol to secure clustered wireless sensor networks [J]. ACSIJ Advances in Computer …
LEACH protocol to secure clustered wireless sensor networks [J]. ACSIJ Advances in Computer …