Systematic literature review on designing trust-based security for WSNs

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Review of Trust based Methodologies in WSNs

In this research pa per we have do ne objective study on latest trust bas ed methodologies that are u sed in securing the WSN, the focu ses in our current s tudy have been on the aspect of en ergy and memory consumption due to implementation of tr ust based techniques. We have developed a comparative chart and review of the techniq ues and have found certain limitat ions worthwhile fo r conduct...

متن کامل

Behavioral Factors Influencing on Designing Network Governance Model in Health Care Domain: A systematic literature review

Background: Establishment of the intra-organizational collaboration network has become a critical strategy to provide high-quality services with a low cost in the health system. In order to utilize the benefits of collaborative networks, an appropriate governance model in accordance with the health system is required. To design a successful model of network governance, different effective facto...

متن کامل

Systematic literature review of fuzzy logic based text summarization

Information Overloadrq  is not a new term but with the massive development in technology which enables anytime, anywhere, easy and unlimited access; participation & publishing of information has consequently escalated its impact. Assisting userslq    informational searches with reduced reading surfing time by extracting and evaluating accurate, authentic & relevant information are the primary c...

متن کامل

designing unmanned aerial vehicle based on neuro-fuzzy systems

در این پایان نامه، کنترل نرو-فازی در پرنده هدایت پذیر از دور (پهپاد) استفاده شده است ابتدا در روش پیشنهادی اول، کنترل کننده نرو-فازی توسط مجموعه اطلاعات یک کنترل کننده pid به صورت off-line آموزش دیده است و در روش دوم یک کنترل کننده نرو-فازی on-line مبتنی بر شناسایی سیستم توسط شبکه عصبی rbf پیشنهاد شده است. سپس کاربرد این کنترل کننده در پهپاد بررسی شده است و مقایسه ای ما بین کنترل کننده های معمو...

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science

سال: 2019

ISSN: 2502-4760,2502-4752

DOI: 10.11591/ijeecs.v14.i3.pp1395-1404