
handle: 10906/2076
The graphic interface (GUI) from the WESST-OT Simulator was validated using quantitative and qualitative human computer interaction (HCI) methods. In order to achieve this, surveys were applied. Also, GUI design principles were analyzed in the context of WESST-OT. Finally, the goals, objects, methods and rule selection quantitative model (GOMS) was applied. The information acquired was used to enhance WESST-OT’s GUI and at the end was validated following the same methodology.
Este artículo presenta un estudio del estado del arte de los mecanismos para proveer seguridad en las redes de sensores inalámbricas. Dentro de los principales esquemas de seguridad se encuentran los manejos de claves y criptografía, los protocolos de autenticación y los mecanismos de detección de intrusos o clones.
SECURITY, LIMITED RESOURCES, SISTEMA & TELEMÁTICA, SEGURIDAD, RECURSOS, REDES DE SENSORES, FACULTAD DE INGENIERÍA, REDES INALÁMBRICAS, 004, PRODUCCIÓN INTELECTUAL REGISTRADA - UNIVERSIDAD ICESI
SECURITY, LIMITED RESOURCES, SISTEMA & TELEMÁTICA, SEGURIDAD, RECURSOS, REDES DE SENSORES, FACULTAD DE INGENIERÍA, REDES INALÁMBRICAS, 004, PRODUCCIÓN INTELECTUAL REGISTRADA - UNIVERSIDAD ICESI
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
