2020
DOI: 10.1007/s12083-020-00898-2
|View full text |Cite
|
Sign up to set email alerts
|

A trust-based minimum cost and quality aware data collection scheme in P2P network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
44
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 56 publications
(44 citation statements)
references
References 58 publications
0
44
0
Order By: Relevance
“…Therefore, most researches revolved around WBSN merely concentrated on the reduction of the energy consumed in addition to extending the lifespan of batteries of biosensors devices. 10 The authors in previous studies [11][12][13][14] have proposed different data collection approaches for various applications. These approaches have reduced the collected data, saved the energy, and improved the network lifetime.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, most researches revolved around WBSN merely concentrated on the reduction of the energy consumed in addition to extending the lifespan of batteries of biosensors devices. 10 The authors in previous studies [11][12][13][14] have proposed different data collection approaches for various applications. These approaches have reduced the collected data, saved the energy, and improved the network lifetime.…”
Section: Related Workmentioning
confidence: 99%
“…These huge changes have led to extremely huge computing and storage capacity of the edge network, so the current network computing center is transferred from the network center to the edge of the network, forming an emerging computing model such as Edge Computing (EC) or Fog Computing [1,[10][11][12]. Because most applications are based on the data sensed and acquired by IoT devices [13,14], many emerging applications sensitive to latency and bandwidth, such as virtual reality, augmented reality and infrastructure for smart cities, benefit from edge computing. In the past, data needs to be sent to the cloud over a long distance, and the results of the cloud center are returned to the user through a long path.…”
Section: Introductionmentioning
confidence: 99%
“…The other type is a generally applicable method of defending against attacks. The most important method of defending against attacks is a strategy based on trust [5,6,11,14,30,34,36]. This type of strategy is not designed for a specific attack behavior, but adopts the corresponding data routing strategy to obtain the trust status of the node.…”
Section: Introductionmentioning
confidence: 99%
“…There exists a great amount of sensing devices in the urban environment, the sensing devices in WSNs can sense the environmental data [1][2][3][4]. The collected sensing data can be processed and sent to the remote server to make decisions, which can help improve the city management [5][6][7].…”
Section: Introductionmentioning
confidence: 99%