• For the next stage, it must be solved that what correct actions should be taken at different layers when a legal node is attacked by multiple malicious nodes.

    该方案还处于研究起步阶段下一步需要明确层的正确行为,以及出现多个恶意节点某个合法节点诬陷采取的行动。

    youdao

  • Sensor node localization is a fundamental technique in WSN. However, unsupervised sensor nodes are susceptible to the from malicious nodes and captured nodes due to its inherent openness.

    无线传感器网络中很多应用都依赖节点坐标位置,所以节点定位技术传感器网络领域中一项非常重要的基础技术

    youdao

  • Transaction time factors, transaction scales, and transactions number are introduced to calculate the trust value. Penalty item is used to limit node to provide malicious service.

    引入了交易时间交易规模、交易次数等因素进行信任计算利用惩罚限制交易节点提供恶意服务

    youdao

  • In addition, the succeeded masquerader detection algorithm is proposed in this scheme. In this algorithm, the sink node monitors and examines the malicious region.

    方案提出了成功假冒攻击源测定算法,其中采用了汇聚节点监控排查恶意区域、普通节点认证转发报警消息机制。

    youdao

  • To reduce false alarm rate, the cluster head carries out second diagnosis mechanisms for malicious after the monitor node found out it.

    为了减小,巡查节点检测信誉度零的恶意节点,需要节点对进行二次诊断

    youdao

  • To reduce false alarm rate, the cluster head carries out second diagnosis mechanisms for malicious after the monitor node found out it.

    为了减小,巡查节点检测信誉度零的恶意节点,需要节点对进行二次诊断

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定