2005년도 6th 2005 International Conference on Computers, Communications and System (2005.11)바로가기
페이지
pp.315-318
저자
Cho, Nam-Pil, Han, Young-Ju, Chung, Tai-Myung
언어
영어(ENG)
URL
https://www.earticle.net/Article/A166218
※ 기관로그인 시 무료 이용이 가능합니다.
※ 학술발표대회집, 워크숍 자료집 중 4페이지 이내 논문은 '요약'만 제공되는 경우가 있으니, 구매 전에 간행물명, 페이지 수 확인 부탁 드립니다.
4,000원
원문정보
초록
영어
Lots of researches have been focusing on ubiquitous computing which means wherever, whenever, whatever the required information must be accessible. In ubiquitous computing environment, ubiquitous sensor network (USN) is the basis technology for gathering and transferring the required information. However sensor network characteristically has more severe vulnerability than the existing networks do. The paper presents operation of secure protocols for delivering information in secure in ubiquitous computing environment and show improvement of the secure transferring protocol.
목차
1 Introduction 2 Relation research 2.1 The definition of the sensor network 2.2 Sensor network routing protocols 2.3 Sensor network security protocol 3 Efficient broadcasting 3.1 Research environment 3.2 SPIN routing protocol and SPIN Ssecurity protocol 3.3 SPIN routing protocol and node directly broadcasting. 3.4 LEACH routing protoc이 and SPINS security protocol 3.5 LEACH routing protocol and node directly broadcasting 4 Conclusions References
저자
Cho, Nam-Pil [ Computer Engineering Sungkyunkwan University ]
Han, Young-Ju [ Computer Engineering Sungkyunkwan University ]
Chung, Tai-Myung [ School of Information & Communication Engineering Sungkyunkwan University ]