[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Yu et al., 2018 - Google Patents

Providing trusted data for industrial wireless sensor networks

Yu et al., 2018

View HTML @Full View
Document ID
9344787034019106718
Author
Yu S
He J
Publication year
Publication venue
EURASIP Journal on Wireless Communications and Networking

External Links

Snippet

The deployment of wireless sensor networks, or WSNs, in industrial domains has attracted much attention over the past few years. An increasing number of applications have been developed such as for condition monitoring in the railway industry. Nevertheless, compared …
Continue reading at link.springer.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Sengan et al. Detection of false data cyber-attacks for the assessment of security in smart grid using deep learning
Istiaque Ahmed et al. Machine learning for authentication and authorization in iot: Taxonomy, challenges and future research direction
Tariq et al. A mobile code-driven trust mechanism for detecting internal attacks in sensor node-powered IoT
Che et al. A lightweight trust management based on Bayesian and Entropy for wireless sensor networks
Ye et al. An efficient dynamic trust evaluation model for wireless sensor networks
Agir et al. User-side adaptive protection of location privacy in participatory sensing
Souissi et al. A multi-level study of information trust models in WSN-assisted IoT
Yu et al. An efficient trust evaluation scheme for node behavior detection in the internet of things
Huang et al. [Retracted] AFLPC: An Asynchronous Federated Learning Privacy‐Preserving Computing Model Applied to 5G‐V2X
Wu et al. A multi-domain trust management model for supporting RFID applications of IoT
Khan et al. A secure and dependable trust assessment (SDTS) scheme for industrial communication networks
Xia et al. A dynamic virus propagation model based on social attributes in city IoT
Sodagari Trends for mobile IoT crowdsourcing privacy and security in the big data era
Kumar et al. ETAS: an efficient trust assessment scheme for BANs
Fan et al. Understanding security in smart city domains from the ANT-centric perspective
Tyagi et al. A detailed study on trust management techniques for security and privacy in IoT: Challenges, trends, and research directions
Zhao et al. CCP-federated deep learning based on user trust chain in social IoV
Nag et al. Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things
Dhulipala et al. Trust management technique in wireless sensor networks: challenges and issues for reliable communication: a review
Dogan ProTru: a provenance‐based trust architecture for wireless sensor networks
Yu et al. Providing trusted data for industrial wireless sensor networks
Yaseen et al. Building an intelligent global IoT reputation and malicious devices detecting system
Li et al. Differential privacy location protection method based on the Markov model
Rathee et al. A trust‐based mechanism for drones in smart cities
Senouci et al. Belief functions in telecommunications and network technologies: an overview