TSRF: A trust-aware secure routing framework in wireless sensor networks

J Duan, D Yang, H Zhu, S Zhang… - International Journal of …, 2014 - journals.sagepub.com
In recent years, trust-aware routing protocol plays a vital role in security of wireless sensor
networks (WSNs), which is one of the most popular network technologies for smart city …

User privacy and data trustworthiness in mobile crowd sensing

D He, S Chan, M Guizani - IEEE wireless communications, 2015 - ieeexplore.ieee.org
Smartphones and other trendy mobile wearable devices are rapidly becoming the dominant
sensing, computing and communication devices in peoples' daily lives. Mobile crowd …

A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks

GM Borkar, AR Mahajan - International Journal of …, 2020 - inderscienceonline.com
Wireless communication formly mobile ad-hoc network (MANET) plays a significant role in
modern technology for transmitting the packets from source node to destination node. The …

Trust management in ubiquitous computing: A Bayesian approach

MK Denko, T Sun, I Woungang - Computer Communications, 2011 - Elsevier
Designing a trust management scheme that can effectively evaluate the relationships among
devices in pervasive computing environments is a challenging task. This paper continues …

Trust-based security for the OLSR routing protocol

A Adnane, C Bidan, RT de Sousa Júnior - Computer Communications, 2013 - Elsevier
The trust is always present implicitly in the protocols based on cooperation, in particular,
between the entities involved in routing operations in Ad hoc networks. Indeed, as the …

Faces: friend-based ad hoc routing using challenges to establish security in MANETs systems

SK Dhurandher, MS Obaidat, K Verma… - IEEE Systems …, 2010 - ieeexplore.ieee.org
Friend based Ad hoc routing using Challenges to Establish Security (FACES) is an algorithm
to provide secure routing in ad hoc mobile networks. We propose this scheme that has been …

[图书][B] Network Protocols and Applications

C Wang, T Jiang, QZB Zhang - 2016 - api.taylorfrancis.com
ZigBee Network Protocols and Applications Page 1 ZigBee ® N etw ork Protocols and A
pplications Edited by Chonggang Wang • Tao Jiang • Qian Zhang ZigBee® Network Protocols …

TRAST: Trust-based distributed topology management for wireless multimedia sensor networks

G Mali, S Misra - IEEE Transactions on Computers, 2015 - ieeexplore.ieee.org
A distributed topology management scheme in wireless multimedia sensor networks
(WMSNs) ensures coverage of an event, prolongs network lifetime, and maintains …

TeaVisor: network hypervisor for bandwidth isolation in SDN-NV

Y Yoo, G Yang, J Lee, C Shin, H Kim… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We introduce TeaVisor that provides bandwidth isolation guarantee for network virtualization
(NV) based on software-defined networking (SDN). SDN-based NV (SDN-NV) offers many …

An energy‐efficient and security aware route selection protocol for wireless sensor networks

T Hayajneh, R Doomun… - Security and …, 2014 - Wiley Online Library
In wireless sensor networks (WSNs), sensor devices have limited supply of energy. The
sensor death due to dissipating battery energy is one of the fundamental design issues in …