[HTML][HTML] Security, trust and privacy risks, responses, and solutions for high-speed smart cities networks: A systematic literature review
High-speed networks are utilized to satisfy user demands by using cloud and edge services.
Due to the heterogeneous nature of these networks, security, trust, and privacy are the …
Due to the heterogeneous nature of these networks, security, trust, and privacy are the …
DAG block: Trust aware load balanced routing and lightweight authentication encryption in WSN
A wireless sensor network (WSN) is a staple network architecture that can be widely used to
support diverse of applications as smart cities, smart homes, etc. However, energy …
support diverse of applications as smart cities, smart homes, etc. However, energy …
A cluster-based trusted routing method using fire hawk optimizer (FHO) in wireless sensor networks (WSNs)
Today, wireless sensor networks (WSNs) are growing rapidly and provide a lot of comfort to
human life. Due to the use of WSNs in various areas, like health care and battlefield, security …
human life. Due to the use of WSNs in various areas, like health care and battlefield, security …
BTEM: Belief based trust evaluation mechanism for wireless sensor networks
With the emergence of WSNs in the recent times, providing trustworthy and reliable data
delivery is challenging task due to unique characteristics and constraints of nodes. Malicious …
delivery is challenging task due to unique characteristics and constraints of nodes. Malicious …
Trust management and evaluation for edge intelligence in the Internet of Things
Abstract Information and Communication Technologies (ICTs) have revolutionised the
traditional communication processes, converting the cities into Smart Cities. Internet of …
traditional communication processes, converting the cities into Smart Cities. Internet of …
Intelligent ad-hoc-on demand multipath distance vector for wormhole attack in clustered WSN
S Singh, HS Saini - Wireless Personal Communications, 2022 - Springer
Abstract In Wireless Senor Networks, security is the most significant issue when sending
such an essential message via wireless connection. This helps attackers to access the …
such an essential message via wireless connection. This helps attackers to access the …
Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network
Abstract The Internet of Medical Things (IoMT) is an extended genre of the Internet of Things
(IoT) where the Things collaborate to provide remote patient health monitoring, also known …
(IoT) where the Things collaborate to provide remote patient health monitoring, also known …
Blockchain powered secure range-free localization in wireless sensor networks
A novel trust-based range-free secure algorithm using blockchain technology is considered
in hostile WSNs for localization. The trust values of beacon nodes are evaluated against …
in hostile WSNs for localization. The trust values of beacon nodes are evaluated against …
FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks
Mobile ad-hoc network (MANET) plays a significant role in the field of communication. Due
to the dynamic movement of nodes, the network infrastructure is frequently changed. All …
to the dynamic movement of nodes, the network infrastructure is frequently changed. All …
A temperature-aware trusted routing scheme for sensor networks: Security approach
This paper presents a hybrid trust model, and a multifactor, depending on trust value of
sensor nodes, remaining energy, and hop count, routing strategy known as Temperature …
sensor nodes, remaining energy, and hop count, routing strategy known as Temperature …