Although IoT technology is advanced, wireless systems are prone to faults and attacks. The replaying information about routing in the case of multi-hop routing has led to the problem of identity deception among nodes. The devastating attacks against the routing protocols as well as harsh network conditions make the situation even worse. Although most of the research in the literature aim at making the IoT system more trustworthy and ensuring faultlessness, it is still a challenging task. Motivated by this, the present proposal introduces a trust-aware routing mechanism (TARM), which uses an edge node with mobility feature that can collect data from faultless nodes. The edge node works based on a trust evaluation method, which segregates the...
Traditional cryptography-based security mechanisms such as authentication and authorization are not ...
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and expos...
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity d...
In the field of applied IoT, a large number of wireless sensor devices are tasked with data producti...
A Wireless sensor network (WSN) is usually composed of a large number of spatially distributed auton...
A Wireless sensor network (WSN) is usually composed of a large number of spatially distributed auton...
The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied a...
Abstract Due to the limitation of battery power, processing capacity, and storage, the sensor nodes ...
In wireless sensor networks (WSNs), existing routing protocols mainly consider energy efficiency or ...
Abstract — Devices in a sensor network need to work in a hostile environment and they are usually po...
Wireless sensor network are constituted by a large number of tiny size sensors and distributed rando...
With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applicati...
Traditional cryptography-based security mechanisms such as authentication and authorization are not ...
Security has become a major concern in practical applications related to Internet of Things, a Trust...
In wireless sensor networks (WSNs), existing routing protocols mainly consider energy efficiency or ...
Traditional cryptography-based security mechanisms such as authentication and authorization are not ...
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and expos...
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity d...
In the field of applied IoT, a large number of wireless sensor devices are tasked with data producti...
A Wireless sensor network (WSN) is usually composed of a large number of spatially distributed auton...
A Wireless sensor network (WSN) is usually composed of a large number of spatially distributed auton...
The Internet of Things (IoT) is the evolving paradigm of interconnectedness of objects with varied a...
Abstract Due to the limitation of battery power, processing capacity, and storage, the sensor nodes ...
In wireless sensor networks (WSNs), existing routing protocols mainly consider energy efficiency or ...
Abstract — Devices in a sensor network need to work in a hostile environment and they are usually po...
Wireless sensor network are constituted by a large number of tiny size sensors and distributed rando...
With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applicati...
Traditional cryptography-based security mechanisms such as authentication and authorization are not ...
Security has become a major concern in practical applications related to Internet of Things, a Trust...
In wireless sensor networks (WSNs), existing routing protocols mainly consider energy efficiency or ...
Traditional cryptography-based security mechanisms such as authentication and authorization are not ...
Nodes in most of the deployments of Wireless Sensor Networks (WSNs) remain un-administered and expos...
The multi-hop routing in wireless sensor networks (WSNs) offers little protection against identity d...