advances in mechanical and electronic engineering volume 3 pdf

In the proceeding of Volume 3 of ICMEE2012, you can learn much more knowledge about Electronic Engineering and Electronic Communication; Electronic Engineering and Electronic Image Processing all around the world. The main role of the proceeding is to be used as an exchange pillar for researchers who are working in the mentioned field.

In order to meet high standard of Springer, the organization committee has made their efforts to do the following things. Firstly, poor quality paper has been refused after reviewing course by anonymous referee experts. Secondly, periodically review meetings have been held around the reviewers about five times for exchanging reviewing suggestions. Finally, the conference organization had several preliminary sessions before the conference. Through efforts of different people and departments, the conference will be successful and fruitful.

During the organization course, we have got help from different people, different
departments, different institutions. Here, we would like to show our first sincere thanks
to publishers of Springer, LNEE series for their kind and enthusiastic help and best
support for our conference.

In a word, it is the different team efforts that they make our conference be successful
on June 23–24, 2012, Hefei, China.We hope that all of participants can give us good
suggestions to improve our working efficiency and service in the future. And we also
hope to get your supporting all the way. Next year, In 2013, we look forward to seeing
all of you at ICMEE2013.

 As a kind of brand-new electronic technology, the data aggregation
protocol is confronted with many difficulties by taking safety issues as
representative. In this paper, we first analyze the well-known threats against
data aggregation in WSNs. In order to study the performance of the common 6
kinds of data aggregation protocols in defending against such attacks, we
categorize them into two parts: tree-based and cluster-based data aggregation
protocols. On this basis, we compare their performance in defending against
these attacks and point out which aspects of them should be improved for
higher security.