ШИФРУВАННЯ ДАНИХ В СЕНСОРНІЙ МЕРЕЖІ, НА ПРИКЛАДІ ZIGBEE
Анотація
Data encryption in the sensor ZigBee-network
The use of wireless data networks in applications such as data collection from energy meters, safety and industrial telemetry require the protection of transmitted information and prevent unauthorized connection of undesirable devices. The article deals with practical issues of data encryption in ZigBee-networks using the example of popular XBee radio modules.
Посилання
M. Di Francesco, G. Anastasi, M. Conti, S.K. Das, and V. Neri. “Reliability and Energy-Efficiency in IEEE 802.15.4/ZigBee Sensor Networks: An Adaptive and Cross-Layer Approach,” IEEE Journal on Selected Areas in Communications, 29(8), pp. 1508-24, Sept. 2011.
Mao G. Wіreless sensor network localіzatіon technіques / G. Mao, B. Fіdan, B. Anderson // Computer Networks, 51(10), pp. 2529 – 2553, 2007.
Chaczko Z. Methods of sensors localіzatіon іn wіreless sensor networks / Z. Chaczko, R. Klempous, J. Nіkodem, M. Nіkodem // Іn Engіneerіng of Computer-Based Systems, 2007. ECBS’07. 14th Annual ІEEE Іnternatіonal Conference and Workshops, pp. 145–152. ІEEE, 2007.
##submission.downloads##
Як цитувати
Номер
Розділ
Ліцензія
Авторське право (c) 2018 Олександр Іванович Лисенко, Сергій Олександрович Зубик
Ця робота ліцензується відповідно до Creative Commons Attribution 4.0 International License.
Authors who submit to this conference agree to the following terms:a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference.
b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference.
c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference.