Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes
Advancement in technology with the proliferation of new wireless communication protocols
gave rise to the new era of ubiquitous computing, called Internet of Things (IoT). IoT …
gave rise to the new era of ubiquitous computing, called Internet of Things (IoT). IoT …
A survey on trust models in heterogeneous networks
Heterogeneous networks (HetNets) merge different types of networks into an integrated
network system, which has become a hot research area in recent years towards next …
network system, which has become a hot research area in recent years towards next …
Blockchain-based trust management model for location privacy preserving in VANET
Vehicular ad hoc network (VANET) is a special mobile ad hoc network (MANET) which plays
an important role in the intelligent traffic system (ITS). Based on the high mobility of VANETs …
an important role in the intelligent traffic system (ITS). Based on the high mobility of VANETs …
[HTML][HTML] Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks
The single planar routing protocol has a slow convergence rate in the large-scale Wireless
Sensor Network (WSN). Although the hierarchical routing protocol can effectively cope with …
Sensor Network (WSN). Although the hierarchical routing protocol can effectively cope with …
NeuroTrust—Artificial-neural-network-based intelligent trust management mechanism for large-scale Internet of Medical Things
Internet of Medical Things (IoMT) provides a diverse platform for healthcare to enhance the
accuracy, reliability, and efficiency. In addition, it utilizes the productivity of available …
accuracy, reliability, and efficiency. In addition, it utilizes the productivity of available …
Information-centric networking solutions for the Internet of Things: A systematic map** review
Due to the similarity between the data-driven nature of sensor and actuator networks
enabling the Internet of Things (IoT) and the data-oriented model of Information-Centric …
enabling the Internet of Things (IoT) and the data-oriented model of Information-Centric …
A trust management scheme to secure mobile information centric networks
Abstract The Named Data Networks (NDN) or Information Centric Networks (ICN) are being
replaced by point-point procedures in order to ensure a reliable and efficient communication …
replaced by point-point procedures in order to ensure a reliable and efficient communication …
Utilizing trusted lightweight ciphers to support electronic-commerce transaction cryptography
Electronic-commerce (e-commerce) has become a provider of distinctive services to
individuals and companies due to the speed and flexibility of transferring orders and …
individuals and companies due to the speed and flexibility of transferring orders and …
[HTML][HTML] Designing efficient sinkhole attack detection mechanism in edge-based IoT deployment
The sinkhole attack in an edge-based Internet of Things (IoT) environment (EIoT) can
devastate and ruin the whole functioning of the communication. The sinkhole attacker nodes …
devastate and ruin the whole functioning of the communication. The sinkhole attacker nodes …
A survey on secure transmission in internet of things: taxonomy, recent techniques, research requirements, and challenges
Internet of things (IoT) is one of the emerging paradigms in the current era that has attracted
many researchers due to its widespread applications. Due to the open nature of the device …
many researchers due to its widespread applications. Due to the open nature of the device …