Survey on computational trust and reputation models

DDS Braga, M Niemann, B Hellingrath… - ACM Computing Surveys …, 2018 - dl.acm.org
Over the recent years, computational trust and reputation models have become an
invaluable method to improve computer-computer and human-computer interaction. As a …

[PDF][PDF] Internet of things based wireless sensor network: a review

SW Nourildean, MD Hassib… - Indones. J. Electr. Eng …, 2022 - researchgate.net
Recently, internet of things (IoT) technologies are developing technology with a variety of
applications. The IoT is defined as a network of ordinary objects such as Internet TVs …

Cooperative communication based access technique for sensor networks

ME Bayrakdar - International Journal of Electronics, 2020 - Taylor & Francis
The collaboration of users in communication systems is defined as cooperative
communication. The cognitive radio, ie dynamic spectrum access technique, is a wireless …

Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks

EPK Gilbert, B Kaliaperumal, EB Rajsingh… - Computers & Electrical …, 2018 - Elsevier
Sensing and relaying are the primary tasks of sensor nodes in a Wireless Sensor Network
(WSN). Hence the recent research focus has been to devise secure, energy efficient ways to …

AIEMLA: artificial intelligence enabled machine learning approach for routing attacks on internet of things

S Sharma, VK Verma - The Journal of Supercomputing, 2021 - Springer
Abstract The Internet of things (IoT) is emerging as a prime area of research in the modern
era. The significance of IoT in the daily life is increasing due to the increase in objects or …

Trust aware nature inspired optimised routing in clustered wireless sensor networks

EPK Gilbert, K Baskaran, EB Rajsingh… - … Journal of Bio …, 2019 - inderscienceonline.com
Wireless sensor networks (WSN) consist of sensor nodes which have capabilities of
sensing, computation and communication. Routing algorithms are required in a WSN when …

Investigations on information solicitation and version number attacks in internet of things

VK Verma, S Sharma - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Self-organizing maps (SOMs) have been widely known for resolving a variety of detection
and classification problems. It is a special kind of machine learning technique that sorts out …

Catenarian-trim medley routing system for energy balancing in dispensed computing networks

VK Verma, A Sharma, K Ntalianis… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Balancing energy consumption to prolong the life of a dispensed computing network is a
challenging issue for researchers. In multi-hop transmission, most of the sensor node energy …

[PDF][PDF] Trust-value based wireless sensor network using compressed sensing

JV Anand - Journal of Electronics, 2020 - scholar.archive.org
Wireless sensor networks have quickly paved way to novel ways of communication between
two nodes. They consist of sensor nodes that have the capacity to sense, communicate and …

Pheromone and path length factor-based trustworthiness estimations in heterogeneous wireless sensor networks

VK Verma - IEEE Sensors Journal, 2016 - ieeexplore.ieee.org
The energy consumption and the resource utilization are the most fundamental concerns to
evaluate trustworthiness of any trust and reputation model (TRM) associated with …