2018
DOI: 10.1016/j.adhoc.2018.07.009
|View full text |Cite
|
Sign up to set email alerts
|

Toward trust based protocols in a pervasive and mobile computing environment: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 106 publications
0
6
0
Order By: Relevance
“…Different types of attack in the IoT environment are described in ( Ahmad & Salah, 2017 ). Usman & Gutierrez (2018) categorised the author‘s focus on wormhole attack and as well as other attacks are reviewed in ( Farjamnia, Gasimov & Kazimov, 2019 ). Finally, the attack is categorised according to the attack method and how the malicious node can achieve its objective.…”
Section: Survey Methodologymentioning
confidence: 99%
“…Different types of attack in the IoT environment are described in ( Ahmad & Salah, 2017 ). Usman & Gutierrez (2018) categorised the author‘s focus on wormhole attack and as well as other attacks are reviewed in ( Farjamnia, Gasimov & Kazimov, 2019 ). Finally, the attack is categorised according to the attack method and how the malicious node can achieve its objective.…”
Section: Survey Methodologymentioning
confidence: 99%
“…Pervasive and mobile intelligence all velopment of new applications and systems and significantly expands the ra puting opportunities, including digital intelligence in everyday items and ho simplify and improve efficiency [26]. Usman and Gutierrez [27] Deep Learning (DL): Solving urban problems may require a deep learning approach to generate large values through urban computing. Many studies have incorporated deep learning into smart city applications to uncover new information from big urban data [15,20].…”
Section: State Of the Current Researchmentioning
confidence: 99%
“…𝛼 𝑟𝑒𝑐 (𝑡 + 1) = 𝛼 𝑟𝑒𝑐 (𝑡) × 𝜏 𝛼 (𝑡) + 𝛼 𝑟𝑝𝑒𝑟𝑖𝑜𝑑 (10) 𝛽 𝑟𝑒𝑐 (𝑡 + 1) = 𝛽 𝑟𝑒𝑐 (𝑡) × 𝜏 𝛽 (𝑡) + 𝛽 𝑟𝑝𝑒𝑟𝑖𝑜𝑑 (11) International Journal of Intelligent Engineering and Systems, Vol. 16…”
Section: ) Referral Trust Updates Without Cb Attackmentioning
confidence: 99%
“…The potential of many elements for evaluating confidence opens up a wide range of study prospects. This motivates the scholars to contribute by creating and implementing a trustbased routing system in the AODV framework [11].…”
Section: Introductionmentioning
confidence: 99%