Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Internet of things: Vision, applications and research challenges
The term “Internet-of-Things” is used as an umbrella keyword for covering various aspects
related to the extension of the Internet and the Web into the physical realm, by means of the …
related to the extension of the Internet and the Web into the physical realm, by means of the …
Key management for beyond 5G mobile small cells: A survey
The highly anticipated 5G network is projected to be introduced in 2020. 5G stakeholders
are unanimous that densification of mobile networks is the way forward. The densification …
are unanimous that densification of mobile networks is the way forward. The densification …
Wireless sensor network security: A survey
368As wireless sensor networks continue to grow, so does the need for effective security
mechanisms. Because sensor networks may interact with sensitive data and/or operate in …
mechanisms. Because sensor networks may interact with sensitive data and/or operate in …
A survey on wireless sensor network security
J Sen - arxiv preprint arxiv:1011.1529, 2010 - arxiv.org
Wireless sensor networks (WSNs) have recently attracted a lot of interest in the research
community due their wide range of applications. Due to distributed nature of these networks …
community due their wide range of applications. Due to distributed nature of these networks …
Trust-based security for wireless ad hoc and sensor networks
Wireless sensors networks are susceptible to a large number of security threats, and
because of the communication, computation and delay constraints of most applications that …
because of the communication, computation and delay constraints of most applications that …
Cybersecurity issues in wireless sensor networks: current challenges and solutions
Wireless sensor networks are deployed without predefined infrastructure and are generally
left unattended. Indeed, the vulnerability of the wireless sensor networks to attacks comes …
left unattended. Indeed, the vulnerability of the wireless sensor networks to attacks comes …
Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
A mobile ad hoc network is a wireless communication network which does not rely on a pre-
existing infrastructure or any centralized management. Securing the exchanges in such …
existing infrastructure or any centralized management. Securing the exchanges in such …
TSRF: A trust-aware secure routing framework in wireless sensor networks
J Duan, D Yang, H Zhu, S Zhang… - International Journal of …, 2014 - journals.sagepub.com
In recent years, trust-aware routing protocol plays a vital role in security of wireless sensor
networks (WSNs), which is one of the most popular network technologies for smart city …
networks (WSNs), which is one of the most popular network technologies for smart city …
Survey of trust models in different network domains
M Momani, S Challa - arxiv preprint arxiv:1010.0168, 2010 - arxiv.org
This paper introduces the security and trust concepts in wireless sensor networks and
explains the difference between them, stating that even though both terms are used …
explains the difference between them, stating that even though both terms are used …
Wireless sensor network attacks and security mechanisms: A short survey
D Martins, H Guyennet - 2010 13th international conference on …, 2010 - ieeexplore.ieee.org
Wireless sensor networks are specific adhoc networks. They are characterized by their
limited computing power and energy constraints. This paper proposes a study of security in …
limited computing power and energy constraints. This paper proposes a study of security in …