scholar.google.com › citations
It is necessary to use the notion of trust and trust management schemes to build secure and dependable wireless sensor network applications. Moreover, ...
Concurrency and Computation: Practice and Experience is a computer science journal publishing research and reviews on parallel and distributed computing.
Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless sensor networks (WSNs). In this paper, an efficient ...
This necessitates the provision of trust, security and privacy of sensors while ensuring a smart and connected ecosystem. For this reason, there is strong ...
Oct 1, 2015 · Yao L, Kang L, Deng F, Deng J, Wu G. Protecting source-location privacy based on multi-rings in wireless sensor networks.
People also ask
What are the security issues with WSN?
What are the unique constraints of wireless sensor network?
What are the issues and challenges in designing a sensor network?
What is security in wireless sensor networks?
Original language, English. Pages (from-to), 3791-3793. Number of pages, 3. Journal, Concurrency Computation. Volume, 27. Issue number, 15.
In large-scale wireless sensor networks (WSNs), in order to enhance network security, it is crucial for a trustor node to perform social milieu oriented routing ...
May 8, 2019 · One of the fundamental questions is how to collect, store, and process the huge amounts of data in a secure and privacy-preserving manner, ...
This special issue aims to foster the latest development in the design, implementation, and evaluation in the fields of trust, reputation, security and privacy ...
The accepted papers of this special issue present novel theories, frameworks, and solutions to the challenging problems of trust, security, and privacy. This ...