원문정보
보안공학연구지원센터(IJSIA)
International Journal of Security and Its Applications
Vol.9 No.10
2015.10
pp.381-394
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Coverage Balancing Strategy
2.1. Assumptions
2.2. Definitions
2.3. Sleep Scheduling of Coverage Balancing
3. Coverage Balancing Based Trust Evaluation Method
3.1. Select Initial Working Nodes
3.2. Update Trust of Nodes
3.3. Update Working Nodes
4. Simulation Experiments and Analysis
4.1. Comparison of Nodes’ Lifetime
4.2. Comparison of Detection Rate
4.3. Comparison of Detection Efficiency
4.4. Comparison of False Alert Rate
5. Conclusion
Acknowledgments
References
1. Introduction
2. Coverage Balancing Strategy
2.1. Assumptions
2.2. Definitions
2.3. Sleep Scheduling of Coverage Balancing
3. Coverage Balancing Based Trust Evaluation Method
3.1. Select Initial Working Nodes
3.2. Update Trust of Nodes
3.3. Update Working Nodes
4. Simulation Experiments and Analysis
4.1. Comparison of Nodes’ Lifetime
4.2. Comparison of Detection Rate
4.3. Comparison of Detection Efficiency
4.4. Comparison of False Alert Rate
5. Conclusion
Acknowledgments
References
저자정보
참고문헌
자료제공 : 네이버학술정보