首页--工业技术论文--自动化技术、计算机技术论文--自动化技术及设备论文--自动化元件、部件论文--发送器(变换器)、传感器论文--传感器的应用论文

基于表的资源受限无线传感器安全模块设计与实现

摘要第4-5页
Abstract第5页
CHAPTER 1 INTRODUCTION第8-18页
    1.1 BACKGROUND第8-10页
    1.2 THE PURPOSE OF PROJECT第10-11页
    1.3 THE STATUS OF RELATED RESEARCH第11-17页
        1.3.1 The Legacy of Internet第11页
        1.3.2 Security in peripheral networks and autoID第11-15页
        1.3.3 Research about algorithms improvement第15-16页
        1.3.4 Research about group key第16-17页
    1.4 MAIN CONTENT AND ORGANIZATION OF THE THESIS第17-18页
CHAPTER 2 SYSTEM REQUIREMENT ANALYSIS第18-30页
    2.1 THE GOAL OF THE SYSTEM第18页
    2.2 THE FUNCTIONAL REQUIREMENTS第18-28页
    2.3 THE NON-FUNCTIONAL REQUIREMENTS第28-29页
    2.4 BRIEF SUMMARY第29-30页
CHAPTER 3 SYSTEM DESIGN第30-82页
    3.1 ANALYSIS AND DESIGN OF HUFFMAN CODING FOR RESOURCE CONSTRAINEDWSN NODE第31-42页
        3.1.1 Traditional implementation第32-35页
        3.1.2 Static implementation第35-39页
        3.1.3 The leaf problem第39-41页
        3.1.4 Optimization第41-42页
    3.2 ANALYSIS AND DESIGN OF ENCRYPTION ALGORITHMS第42-66页
        3.2.1 Design of Rijndael and AES for resource limited node第45-53页
        3.2.2 Design of DES for resource limited node第53-61页
        3.2.3 Analysis of RSA第61-63页
        3.2.4 Analysis of Rabin第63-64页
        3.2.5 Design and Analysis of Vigenere第64-65页
        3.2.6 Design and analysis of XOR第65-66页
    3.3 KEYS POOL DESIGN FROM MEMORY第66-69页
    3.4 CHOICE OF MESSAGE FOR RESOURCE LIMITED SENSOR NODE第69-75页
        3.4.1 MAC layer第69-71页
        3.4.2 Network layer第71-73页
        3.4.3 Application Layer Frame Formats第73-75页
    3.5 FROM COMMAND CODE TO TABLE-BASED第75-77页
    3.6 DESIGN OF CONTEXT-AWARE第77-80页
        3.6.1 Description of context awareness第77-79页
        3.6.2 Design of context-aware in the module第79-80页
    3.7 DESIGN OF SYNCHRONIZATION第80-81页
    3.8 BRIEF SUMMARY第81-82页
Chapter 4 System Implementation and Testing第82-109页
    4.1 THE ENVIRONMENT OF SYSTEM IMPLEMENTATION第82-90页
    4.2 KEY PROGRAM FLOW CHARTS第90-94页
    4.3 KEY INTERFACES OF THE SOFTWARE SYSTEM第94-97页
    4.4 SYSTEM TESTING第97-107页
        4.4.1 Testing tool第97-99页
        4.4.2 Testing command第99-102页
        4.4.3 Testing code第102-106页
        4.4.4 Summary of evaluation the security module第106-107页
    4.5 BRIEF SUMMARY第107-109页
CONCLUSION第109-110页
REFERENCES第110-116页
ACKNOWLEDGEMENT第116-117页
RESUME第117-118页
EVALUATIONS OF SUPERVISORS第118-119页

论文共119页,点击 下载论文
上一篇:强度叠加编码在星间光MIMO通信中的应用研究
下一篇:公共性视阈下网络公民社会的生成与建构