Yu et al., 2018 - Google Patents
Providing trusted data for industrial wireless sensor networksYu et al., 2018
View HTML- Document ID
- 9344787034019106718
- Author
- Yu S
- He J
- Publication year
- Publication venue
- EURASIP Journal on Wireless Communications and Networking
External Links
Snippet
The deployment of wireless sensor networks, or WSNs, in industrial domains has attracted much attention over the past few years. An increasing number of applications have been developed such as for condition monitoring in the railway industry. Nevertheless, compared …
- 238000009826 distribution 0 abstract description 13
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sengan et al. | Detection of false data cyber-attacks for the assessment of security in smart grid using deep learning | |
Istiaque Ahmed et al. | Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction | |
Tariq et al. | A mobile code-driven trust mechanism for detecting internal attacks in sensor node-powered IoT | |
Che et al. | A lightweight trust management based on Bayesian and Entropy for wireless sensor networks | |
Ye et al. | An efficient dynamic trust evaluation model for wireless sensor networks | |
Agir et al. | User-side adaptive protection of location privacy in participatory sensing | |
Souissi et al. | A multi-level study of information trust models in WSN-assisted IoT | |
Yu et al. | An efficient trust evaluation scheme for node behavior detection in the internet of things | |
Huang et al. | [Retracted] AFLPC: An Asynchronous Federated Learning Privacy‐Preserving Computing Model Applied to 5G‐V2X | |
Wu et al. | A multi-domain trust management model for supporting RFID applications of IoT | |
Khan et al. | A secure and dependable trust assessment (SDTS) scheme for industrial communication networks | |
Xia et al. | A dynamic virus propagation model based on social attributes in city IoT | |
Sodagari | Trends for mobile IoT crowdsourcing privacy and security in the big data era | |
Kumar et al. | ETAS: an efficient trust assessment scheme for BANs | |
Fan et al. | Understanding security in smart city domains from the ANT-centric perspective | |
Tyagi et al. | A detailed study on trust management techniques for security and privacy in IoT: Challenges, trends, and research directions | |
Zhao et al. | CCP-federated deep learning based on user trust chain in social IoV | |
Nag et al. | Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things | |
Dhulipala et al. | Trust management technique in wireless sensor networks: challenges and issues for reliable communication: a review | |
Dogan | ProTru: a provenance‐based trust architecture for wireless sensor networks | |
Yu et al. | Providing trusted data for industrial wireless sensor networks | |
Yaseen et al. | Building an intelligent global IoT reputation and malicious devices detecting system | |
Li et al. | Differential privacy location protection method based on the Markov model | |
Rathee et al. | A trust‐based mechanism for drones in smart cities | |
Senouci et al. | Belief functions in telecommunications and network technologies: an overview |