Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Ayman Tajeddine"'
Publikováno v:
Sensors, Vol 15, Iss 2, Pp 3299-3333 (2015)
In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trus
Externí odkaz:
https://doaj.org/article/d357967f8254464e8c601f03e8a79784
Publikováno v:
Applied Soft Computing. 11:345-355
We present PATROL-F (comPrehensive reputAtion-based TRust mOdeL with Fuzzy subsystems) as a comprehensive model for reputation-based trust incorporating fuzzy subsystems to protect interacting hosts in distributed systems. PATROL-F is the fuzzy versi
Publikováno v:
Sensors
Volume 15
Issue 2
Pages 3299-3333
Sensors, Vol 15, Iss 2, Pp 3299-3333 (2015)
Sensors (Basel, Switzerland)
Volume 15
Issue 2
Pages 3299-3333
Sensors, Vol 15, Iss 2, Pp 3299-3333 (2015)
Sensors (Basel, Switzerland)
In this paper, we present CENTERA, a CENtralized Trust-based Efficient Routing protocol with an appropriate authentication scheme for wireless sensor networks (WSN). CENTERA utilizes the more powerful base station (BS) to gather minimal neighbor trus
Publikováno v:
MELECON 2014 - 2014 17th IEEE Mediterranean Electrotechnical Conference.
In this paper, we discuss the different authentication techniques suitable for severely constrained nodes in wireless sensor networks. We divide such techniques into three main categories based on symmetric cryptography, asymmetric cryptography, and
Publikováno v:
PST
In this paper, we present CENTER, a CENtralized Trust-based Efficient Routing protocol for wireless sensor networks (WSN). CENTER is a secure and efficient routing protocol that utilizes the powerful sink base station (BS) to identify and ban differe
Publikováno v:
ICEAC
We present H-TRACE as a Hybrid TRust And Competence-based Energy efficient routing scheme that saves energy by protecting mobile ad hoc networks (MANETs) from various attacks and misbehaving nodes. The network consists of mobile nodes trying to acces
Publikováno v:
IWCMC
We present TRACE as a centralized TRust And Competence-based Energy-efficient routing scheme to protect wireless sensor networks from various attacks and misbehaving nodes. TRACE identifies different types of “bad” nodes that can affect the corre
Publikováno v:
2010 International Conference on Energy Aware Computing.
We present a centralized energy-aware trust-based routing scheme for wireless sensor networks. The proposed scheme saves energy and lengthens network lifetime while making the routing protocol more efficient, fairer, and more secure.
Publikováno v:
Q2SWinet
We present SEGURA, a Bundle layer security extension for ensuring the authenticity and integrity of message bundles in Delay Tolerant Networks (DTNs). SEGURA employs probabilistic set membership constructs to amortize the cryptographic functionality
Publikováno v:
CIT
Vehicular ad hoc network (VANET) is a promising technology for providing safer roads and a more efficient driving experience. However, the deployment of VANETs is dependent on several issues in security and privacy. In this paper, a trust-based priva