Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Game theory meets wireless sensor networks security requirements and threats mitigation: A survey
We present a study of using game theory for protecting wireless sensor networks (WSNs)
from selfish behavior or malicious nodes. Due to scalability, low complexity and …
from selfish behavior or malicious nodes. Due to scalability, low complexity and …
Data aggregation in wireless sensor networks: from the perspective of security
Nodes in wireless sensor networks (WSNs) are usually deployed in an unattended even
hostile environment. What is worse, these nodes are equipped with limited battery, storage …
hostile environment. What is worse, these nodes are equipped with limited battery, storage …
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
As the trust issue in wireless sensor networks is emerging as one important factor in security
schemes, it is necessary to analyze how to resist attacks with a trust scheme. In this paper …
schemes, it is necessary to analyze how to resist attacks with a trust scheme. In this paper …
A data aggregation approach exploiting spatial and temporal correlation among sensor data in wireless sensor networks
Wireless sensor networks (WSNs) have various applications which include zone
surveillance, environmental monitoring, event tracking where the operation mode is long …
surveillance, environmental monitoring, event tracking where the operation mode is long …
Detecting profile injection attacks in collaborative recommender systems
Collaborative recommender systems are known to be highly vulnerable to profile injection
attacks, attacks that involve the insertion of biased profiles into the ratings database for the …
attacks, attacks that involve the insertion of biased profiles into the ratings database for the …
Review on security issues and applications of trust mechanism in wireless sensor networks
Z **a, Z Wei, H Zhang - Computational Intelligence and …, 2022 - Wiley Online Library
The scale of wireless sensor networks changes depending on specific application tasks.
How to design a relatively simple security mechanism that can extend with the expansion of …
How to design a relatively simple security mechanism that can extend with the expansion of …
Reputation-based trust systems for wireless sensor networks: A comprehensive review
Cryptographic mechanisms alone are insufficient to protect Wireless Sensor Networks
(WSNs), because sensors are deployed for long periods in hostile environments where it is …
(WSNs), because sensors are deployed for long periods in hostile environments where it is …
An area-based approach for node replica detection in wireless sensor networks
Typical wireless sensor networks have restricted resources on memory capacity,
computing/processing power, and energy supply. However, wireless sensor network has …
computing/processing power, and energy supply. However, wireless sensor network has …
The adoption of socio‐and bio‐inspired algorithms for trust models in wireless sensor networks: A survey
The security of a wireless sensor network is greatly increased with increasing levels of
trustworthiness of nodes on the network. There are a number of trust models proposed that …
trustworthiness of nodes on the network. There are a number of trust models proposed that …
Efficient data aggregation with in-network integrity control for WSN
Energy is a scarce resource in Wireless Sensor Networks (WSN). Some studies show that
more than 70% of energy is consumed in data transmission in WSN. Since most of the time …
more than 70% of energy is consumed in data transmission in WSN. Since most of the time …