2022
DOI: 10.1016/j.comcom.2022.02.004
|View full text |Cite
|
Sign up to set email alerts
|

Secure routing with multi-watchdog construction using deep particle convolutional model for IoT based 5G wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 40 publications
(18 citation statements)
references
References 33 publications
0
18
0
Order By: Relevance
“…Priyanka et al [7] found that the past investment experience and years of investment experience of CPAs also affect the investment risk in future investment work, and the risk prevention measures recognized, learned, and accumulated in the experience can provide the basis for future investment work. Literature [8] based on the diversification of investment methods and the Internet environment, argues that CPA investment risks come from the level of information technology security, the level of system operation control, and the level of daily testing. Literature [9] based on big data cloud computing technology under the analysis of investment means, investment mode, and investment evidence relationship, argues that investment risk increases with the increase of insecurity factors existing in the network environment because big data cloud computers improve investment efficiency mainly with the help of the network environment.…”
Section: Related Workmentioning
confidence: 99%
“…Priyanka et al [7] found that the past investment experience and years of investment experience of CPAs also affect the investment risk in future investment work, and the risk prevention measures recognized, learned, and accumulated in the experience can provide the basis for future investment work. Literature [8] based on the diversification of investment methods and the Internet environment, argues that CPA investment risks come from the level of information technology security, the level of system operation control, and the level of daily testing. Literature [9] based on big data cloud computing technology under the analysis of investment means, investment mode, and investment evidence relationship, argues that investment risk increases with the increase of insecurity factors existing in the network environment because big data cloud computers improve investment efficiency mainly with the help of the network environment.…”
Section: Related Workmentioning
confidence: 99%
“…Basic functions such as creating a TCP server and adding or deleting multiple clients are implemented through Qt's QTcpServer class. Control instructions are issued through TCP/IP protocol to interact with the hardware monitoring system, and the sampling rate and sampling time are set to read the client data [14]. At the same time, the module also has the function of detecting the client connection state.…”
Section: Communication Module Designmentioning
confidence: 99%
“…As WSN distributes the data from various sender nodes via multi-path-routing procedures, the need for sender-originated IHFs is generated for the original frame sequence. In this process, each IHF holds a random number of fake data and other lookalike network credentials to thwart the attackers [ 47 , 48 ].…”
Section: Methodsmentioning
confidence: 99%