您当前的位置:
首页 >
文章列表页 >
LEACH protocol based security mechanism for Sybil attack detection
更新时间:2024-10-14
    • LEACH protocol based security mechanism for Sybil attack detection

    • Vol. 32, Issue 8, Pages: 143-149(2011)
    • CLC: TP393.08
    • Published:2011

    移动端阅览

  • CHEN Shan-shan1, YANG Geng2, CHEN Sheng-shou2. LEACH protocol based security mechanism for Sybil attack detection[J]. 2011, 32(8): 143-149. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

929

下载量

5

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Strongly connected dominating set construction algorithm balancing time delay and energy consumption
GPS-independent lightweight reflective collaborative false data filtering scheme for sensor networks
Anomaly detection method for spatio-temporal correlation of WSN nodes based on graph prompt fine-tuning
Fusion reconstruction mechanism and contrast learning method for WSN abnormal node detection
Energy-saving clustering routing algorithm based on semi-fixed cluster for wireless sensor networks

Related Author

Yan-jing SUN
Jian-sheng QIAN
Shan-shan MA
Peng REN
Liu Zhixiong
Yin Hui
YE Miao
CUI Jing

Related Institution

School of Information and Electrical Engineering,China University of Mining and Technology
State Key Laboratory of Coal Resources and Safe Min ng,China University of Mining and Technology
School of Computer Science and Engineering, Changsha University
School of Computer Science and Information Security, Guilin University of Electronic Technology
Guangxi Wireless Broadband Communication and Signal Processing Key Laboratory, Guilin University of Electronic Technology
0