M Mudassar, Y Zhai, L Liao, J Shen - IEEE Access, 2020 - ieeexplore.ieee.org
… methodology, we have tried to enhance QoS for an IoTapplication. … groupformation and task distribution is shown in Algorithm 1. Edge node Eorg will send a request for groupformation…
… the wireless IoT devices within a group of devices. The main steps of the proposed coalition formation methodology are as follows: 1. Initially, we consider the whole set of wireless IoT …
… application in a smart city context, our approach introduces the actual possibility of constructing groups of IoT … by the social capital of the IoT community, guaranteeing on the other hand …
… Nowadays, a challenge for the “InternetofThings” (IoT) world is … for groupformation we will describe in Section 4 is designed to lead the agents community to a configuration of groups …
… analyzed two secure group key establishment mechanisms for multicasting in WSNs in the context of IoTapplications. The key derivations also implicitly authenticate group members, …
M Ponguwala, DRS Rao - EAI Endorsed Transactions on …, 2019 - publications.eai.eu
… CONCLUSION: The MANET-IoT network is secured by groupformation and trust filtering approaches. Further, involvement of cryptography function ensures data security whereas hash …
… Hence, the application of the PoW in an IoT context often requires the adoption of other technologies as, for instance, the cloud computing. Also the long latency, low scalability and poor …
… in forminggroups of reliable recommenders over a CoT context for improving IoT devices … Some interesting applications of trust systems in IoT and CC scenarios can by find in [3, 19, …
… the possible IoTapplication scenarios. Indeed, expansive consensus protocols, like the Proof of Work (PoW) adopted by the Bitcoin currency [19] to validate and adding a new block is …