Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference18 articles.
1. Singh, A., Kumar, D., & Hötzel, J. (2018). IoT Based information and communication system for enhancing underground mines safety and productivity: Genesis, taxonomy and open issues. Ad Hoc Networks, 78, 115–129.
2. Soderi, S. (2019). Acoustic-based security: A key enabling technology for wireless sensor networks. International Journal of Wireless Information Networks.
3. Ostadal, R., Matyas, V., Svenda, P., & Nemec, L. (2019). Crowdsourced Security Reconstitution for Wireless Sensor Networks: Secrecy Amplification. Sensor.
4. Banerjee, P. S., Paulchoudhury, J., & Chaudhuri, S. R. (2013). Fuzzy membership function in a trust based AODV for MANET. International Journal of Computer Network and Information Security, 5(12), 27–34. https://doi.org/10.5815/ijcnis.2013.12.04.
5. Chatterjee, P. (2009). Trust based clustering and secure routing scheme for mobile ad hoc networks. International Journal of Computer Networks and Communication, 1(2), 84–97.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. MR-TBA – An improved Trust-based Security mechanism for IoT Networks;2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS);2024-02-24
2. Intelligent transformation of 6G network by incorporating Expert Systems;2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS);2023-02-18
3. Certain Investigation on Improved Cluster Protocol with Trust security for Wireless Sensor Networks;International Journal of Electrical and Electronics Research;2022-12-30
4. ARPVP: Attack Resilient Position-Based VANET Protocol Using Ant Colony Optimization;Wireless Personal Communications;2022-11-10
5. A predictive vampire attack detection by social spider optimized Gaussian mixture model clustering;Concurrency and Computation: Practice and Experience;2022-11-04