A survey: Optimization and applications of evidence fusion algorithm based on Dempster–Shafer theory
K Zhao, L Li, Z Chen, R Sun, G Yuan, J Li - Applied Soft Computing, 2022 - Elsevier
Abstract Since Dempster–Shafer evidence theory was proposed, it has been widely and
successfully used in many fields including risk analysis, fault diagnosis, wireless sensor …
successfully used in many fields including risk analysis, fault diagnosis, wireless sensor …
Dynamic key management in wireless sensor networks: A survey
X He, M Niedermeier, H De Meer - Journal of network and computer …, 2013 - Elsevier
Wireless sensor networks (WSNs) have a vast field of applications, including environment
monitoring, battlefield surveillance and target tracking systems. As WSNs are usually …
monitoring, battlefield surveillance and target tracking systems. As WSNs are usually …
Key management systems for sensor networks in the context of the Internet of Things
If a wireless sensor network (WSN) is to be completely integrated into the Internet as part of
the Internet of Things (IoT), it is necessary to consider various security challenges, such as …
the Internet of Things (IoT), it is necessary to consider various security challenges, such as …
[PDF][PDF] Wireless sensor networks and the internet of things: Do we need a complete integration?
Wireless sensor networks (WSN) behave as a digital skin, providing a virtual layer where the
information about the physical world can be accessed by any computational system. As a …
information about the physical world can be accessed by any computational system. As a …
[PDF][PDF] 面向物联网的无线传感器网络综述
钱志鸿, 王义君 - 电子与信息学报, 2013 - edit.jeit.ac.cn
在分析无线传感器网络国内外研究现状及技术成熟度的基础上, 从技术层面阐述了无线传感器
网络与物联网之间的相互关系, 总结了无线传感器网络系统执行所需要的信息采集系统设计 …
网络与物联网之间的相互关系, 总结了无线传感器网络系统执行所需要的信息采集系统设计 …
Secure key management and mutual authentication protocol for wireless sensor network by linking edge devices using hybrid approach
Abstract Wireless Sensor Networks (WSNs) play a crucial role in develo** the Internet of
Things (IoT) by collecting data from hostile environments like military and civil domains with …
Things (IoT) by collecting data from hostile environments like military and civil domains with …
Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey
The integration of low-power wireless sensing and actuating devices with the Internet will
provide an important contribution to the formation of a global communications architecture …
provide an important contribution to the formation of a global communications architecture …
A survey of key bootstrap** protocols based on public key cryptography in the Internet of Things
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks
W Zhang, S Zhu, J Tang, N **ong - The Journal of Supercomputing, 2018 - Springer
With the development of Internet technology, social network has become an important
application in the network life. However, due to the rapid increase in the number of users …
application in the network life. However, due to the rapid increase in the number of users …
Survey on security in intra-body area network communication
With the advances in microelectronics, embedded computing, and wireless communications,
the interest in Body Sensor Networks has risen sharply and has enabled the development …
the interest in Body Sensor Networks has risen sharply and has enabled the development …