نتایج جستجو برای: wireless networks lorawan

تعداد نتایج: 479341  

With the rapid growth of wireless access networks, various providers offer their services using different technologies such as Wi-Fi, Wimax, 3G, 4G and so on. These networks compete for the scarce wireless spectrum. The spectrum is considered to be a scarce resource moderated by the spectrum allocation regulatory (“regulatory” for short) which is the governance body aiming to maximize the socia...

Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...

Merging the adaptive networks with the free space optical (FSO) communication technology is a very interesting field of research because by adding the benefits of this technology, the adaptive networks become more efficient, cheap and secure. This is due to the fact that FSO communication uses unregistered visible light bandwidth instead of the overused radio spectrum. However, in spite of all ...

Journal: :journal of communication engineering 0

clustering is an effective approach for managing nodes in wireless sensor network (wsn). a new method of clustering mechanism with using binary gravitational search algorithm (bgsa) in wsn, is proposed in this paper to improve the energy consumption of the sensor nodes.reducing the energy consumption of sensors in wsnsis the objective of this paper that is through selecting thesub optimum senso...

In vehicular ad hoc networks there is the ability to communicate between vehicles. This Communication which is wireless should be rapid and reliable. These networks have unique characteristic. This communication among vehicles has many advantages in safety and comfort applications. Since, the roads are always encountered to accidents and risks, using optimized tools could be useful in these sit...

Journal: :International Journal of Advanced Science and Technology 2017

Journal: :IEEE Vehicular Technology Magazine 2010

Journal: :Journal of ICT standardisation 2021

The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. fundamental properties supported in are mutual end-point authentication, data origin integrity replay protection, confidentiality. symmetric cryptography prior secret key sharing between a device server enables an extremely power efficient network activation proc...

Journal: :journal of computer and robotics 0
hamid reza bakhshi electrical engineering department, shahed university, tehran, iran maryam benabbas electrical engineering department, shahed university, tehran, iran

a wireless sensor network consists of many inexpensive sensor nodes that can be used toconfidently extract data from the environment .nodes are organized into clusters and in each cluster all non-cluster nodes transmit their data only to the cluster-head .the cluster-head transmits all received data to the base station .because of energy limitation in sensor nodes and energy reduction in each d...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید