A malicious foe may introduce additional nodes within the network or compromise existing ones. Therefore, assuring high data trustworthiness is vital for proper decision-making. Data provenance represents a vital element in evaluating the standing of sensor data. Large-scale sensor systems are deployed in several application domains, and also the data they collect are utilized in decision-creating critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. Provenance management for sensor systems introduces several challenging needs, for example low energy and bandwidth consumption, efficient storage and secure transmission. Within this paper, we advise a manuscript lig...
Since data are originated and processed by multiple agents in wireless sensor networks, data provena...
A successful application of an Internet of Things (IoT) based network depends on the accurate and su...
Sensor nodes are resource-constrained and prone to hardware or software faults. The faulty sensors m...
Data provenance represents an important consider evaluating the standing of sensor data. Large-scale...
IN Wireless sensor networks Large-scale sensor networks are deployed in numerous application domains...
Sensor networks are utilized as a part of various application spaces, for example, digital physical ...
Abstract-Large-scale sensor networks are being deployed in numerous application domains, and often t...
Abstract – The numerous applications should work in Large-scale sensor networks domains. The data co...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
The sensor networks are popularly increasing and it used as a effective way in decision making infra...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Assessing the trustworthiness of sensor data and transmitters of this data is critical for quality a...
A series of systems are connected to form a network. Vast amount of data moves through this network....
Far reaching scale sensor frameworks are sent in different application spaces, and the data they acc...
Since data are originated and processed by multiple agents in wireless sensor networks, data provena...
A successful application of an Internet of Things (IoT) based network depends on the accurate and su...
Sensor nodes are resource-constrained and prone to hardware or software faults. The faulty sensors m...
Data provenance represents an important consider evaluating the standing of sensor data. Large-scale...
IN Wireless sensor networks Large-scale sensor networks are deployed in numerous application domains...
Sensor networks are utilized as a part of various application spaces, for example, digital physical ...
Abstract-Large-scale sensor networks are being deployed in numerous application domains, and often t...
Abstract – The numerous applications should work in Large-scale sensor networks domains. The data co...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
The sensor networks are popularly increasing and it used as a effective way in decision making infra...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Assessing the trustworthiness of sensor data and transmitters of this data is critical for quality a...
A series of systems are connected to form a network. Vast amount of data moves through this network....
Far reaching scale sensor frameworks are sent in different application spaces, and the data they acc...
Since data are originated and processed by multiple agents in wireless sensor networks, data provena...
A successful application of an Internet of Things (IoT) based network depends on the accurate and su...
Sensor nodes are resource-constrained and prone to hardware or software faults. The faulty sensors m...