Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Trust-based secure routing schemes are more effective than cryptographic routing protocols
to convey energy-efficient data in WSNs since cryptographic protocols require high …
to convey energy-efficient data in WSNs since cryptographic protocols require high …
TASRP: a trust aware secure routing protocol for wireless sensor networks
Trust-based security models are efficient and reliable over traditional cryptographic schemes
(eg, encryption, key management schemes) to detect and alleviate various internal threats …
(eg, encryption, key management schemes) to detect and alleviate various internal threats …
Distributed token circulation in mobile ad hoc networks
This paper presents several distributed algorithms that cause a token to continually circulate
through all the nodes of a mobile ad hoc network. An important application of such …
through all the nodes of a mobile ad hoc network. An important application of such …
Trust based routing algorithm to improve quality of service in DSR protocol
Wireless sensor networks involve low power fixed and mobile nodes with limited energy
resources. Lack of resources such as energy and bandwidth, could reduce cooperation …
resources. Lack of resources such as energy and bandwidth, could reduce cooperation …
Secure multi-hop routing protocols in Wireless Sensor Networks: Requirements, challenges and solutions
Wireless Sensor Networks (WSNs) have been a subject of extensive research and have
undergone explosive growth in the last few years. WSNs utilize collaborative measures such …
undergone explosive growth in the last few years. WSNs utilize collaborative measures such …
A secure region-based geographic routing protocol (SRBGR) for wireless sensor networks
Due to the lack of dependency for routing initiation and an inadequate allocated sextant on
responding messages, the secure geographic routing protocols for Wireless Sensor …
responding messages, the secure geographic routing protocols for Wireless Sensor …
Secure routing path using trust values for wireless sensor networks
Traditional cryptography-based security mechanisms such as authentication and
authorization are not effective against insider attacks like wormhole, sinkhole, selective …
authorization are not effective against insider attacks like wormhole, sinkhole, selective …
Self-adjustable trust-based energy efficient routing for smart grid systems
Smart Grid is the trend of next generation electrical power system which makes the power
grid intelligent and energy efficient. It requires high level of network reliability to support two …
grid intelligent and energy efficient. It requires high level of network reliability to support two …
Towards an evaluation model of trust and reputation management systems
The paper presents a set of concepts which can establish a basis for the creation of new
evaluation model of trust and reputation management systems (TRM). The presented …
evaluation model of trust and reputation management systems (TRM). The presented …
Trust-based geographical routing for smart grid communication networks
Smart Grid is the trend of next generation power distribution and management network that
enable interactive communication and operation between consumers and suppliers, which …
enable interactive communication and operation between consumers and suppliers, which …