1) malicious nodes detection
恶意节点检测
1.
Further more, the security research problems faced recently and the further researches in WSN are pointed outA new malicious nodes detection method, which is based on source coding and multi-path transmission, is proposed.
目前的恶意节点检测和定位策略大多数都需要特殊硬件的支持,或者依赖于节点监听,加密,身份认证等机制,这些机制大大增加了无线传感器网络的建设成本以及计算、通信的开销。
2) malicious node
恶意节点
1.
The existence of malicious nodes may lead to a series of security problems in wireless sensor networks.
恶意节点的存在会给无线传感器网络带来一系列的安全隐患。
2.
The reputation security is guaranteed by the malicious nodes list and the table-tail information list.
信誉查询时查询节点根据被查询节点交互历史表的信息直接定向到提供被查询节点信誉信息的节点,恶意节点表和表尾信息表保证了信誉信息的安全。
3) malicious-node-group
恶意节点组
1.
After receive all the pieces of a data packet,the destina-tion node could judge whether a malicious modification had been occurred,if so,the malicious node would be found out or be located in a malicious-node-group by a de.
基于多径路由协议,采用RS编码技术,设计了一种将数据信息编码后分片沿不同路径传输的方法,在目的节点对恶意篡改行为进行检测,确定恶意节点的具体位置或将恶意节点锁定在恶意节点组内。
4) malicious node localization
恶意节点定位
5) network node detection
节点检测
1.
This dissertation studies the data acquisition and network node detection of .
本文把系统分为两个部分:数据采集和节点检测。
补充资料:恶意
不良的居心;坏的用意:一句玩笑,并无~ㄧ不要把人家的一片好心当成~。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条