نتایج جستجو برای: trust aggregation
تعداد نتایج: 124329 فیلتر نتایج به سال:
Wireless sensor networks (WSNs) as an emerging technology faces numerous challenges. Sensor nodes are usually resource constrained. Sensor nodes are also vulnerable to physical attacks or node compromises. Answering queries over data is one of the basic functionalities of WSNs. Both resource constraints and security issues make designing mechanisms for data aggregation particularly challenging....
Data aggregation is an essential operation to reduce energy consumption in large-scale wireless sensor networks WSNs . A compromised node may forge an aggregation result and mislead base station into trusting a false reading. Efficient and secure aggregation scheme is critical in WSN applications due to the stringent resource constraints. In this paper, we propose a method to build up the repre...
We propose a secure data aggregation (SDA) framework for mobile sensor networks whose topology changes dynamically with time. The SDA framework (designed to be resilient to both insider and outsider attacks) comprises of a pair-wise key establishment mechanism run along the edges of a data gathering tree and a distributed trust evaluation model that is tightly integrated with the data aggregati...
In this paper we survey trust computation models for Internet of things (IoT) systems for the purpose of service management, i.e., whether or not to select an IoT device as a service provider. Future IoT systems will connect the physical world into cyberspace everywhere and everything via billions of smart objects, and are expected to have a high economic impact. To date there is little work on...
Trust plays a critical role in determining social interactions in both online and offline networks, and reduces information overload, uncertainties and risk from unreliable users. In a social network, even if two users are not directly connected, one user can still trust the other user if there exists at least one path between the two users through friendship networks. This is the result of tru...
In the blooming era of the Internet of Things (IoT), trust has been accepted as a vital factor for provisioning secure, reliable, seamless communications and services. However, a large number of challenges still remain unsolved due to the ambiguity of the concept of trust as well as the variety of divergent trust models in different contexts. In this research, we augment the trust concept, the ...
Wireless sensor networks usually consist of hundreds or thousands of inexpensive and low-powered sensing devices. In WSN, nodes have low computational power and communication resources to collect data to a specific function. Nodes have limited battery power and s mall data storage. In WSN, Security is an important issue, therefore its need to create a secure transmission model with min imum ove...
To mitigate the attacks by malicious peers and to isolate them in peer-to-peer (P2P) networks, several reputation systems have been proposed past. The relative ranking method is most popular among them. In this method, are ranked according their network. major limitation of that it does not give any absolute interpretation about peers, can only differentiate given set peers. This more significa...
the present paper deals with criminal issues. for example, legal injunction on the necessity of returning a deposit has a legal nature and legal injunction on the punishment of those who breach the trust has a criminal nature. existing social issues are the basis of classification of some instances into the issue, some of which are based on variation and others on quality. therefore, the motiva...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید