2018
DOI: 10.1016/j.jnca.2018.09.001
|View full text |Cite
|
Sign up to set email alerts
|

A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
9
1

Relationship

2
8

Authors

Journals

citations
Cited by 22 publications
(10 citation statements)
references
References 33 publications
0
10
0
Order By: Relevance
“…Therefore, the mine risk assessment problem shows randomness; moreover, the basic concept of ambiguity can be characterized as the uncertainty contained in the event that has occurred but is difficult to accurately define. The method has been applied in many fields [39][40][41][42][43][44][45][46][47][48] and achieved good evaluation results.…”
Section: Definition Of the Cloud Modelmentioning
confidence: 99%
“…Therefore, the mine risk assessment problem shows randomness; moreover, the basic concept of ambiguity can be characterized as the uncertainty contained in the event that has occurred but is difficult to accurately define. The method has been applied in many fields [39][40][41][42][43][44][45][46][47][48] and achieved good evaluation results.…”
Section: Definition Of the Cloud Modelmentioning
confidence: 99%
“…The user can address requests to other nodes in the network, specifying the type of required data and harvesting them through the sink node. Routing in LS-WSNs remain a very active area of research, and several routing protocols have been proposed [12,36,100,103,105,106,107,108]. Recently, routing protocols for WSNs have been the subject of several studies, and various studies have been published.…”
Section: Data Transferring In Ls-wsnsmentioning
confidence: 99%
“…IoT finds applications in many fields such as smart Buildings, smart cities, smart agriculture etc [2]. Typically IoT is described by tiny devices in the modern world, widely distributed with finite storage and processing capabilities focusing on issues such as efficiency, output, and privacy protection [3,4]. And from the other hand, cloud computing, having huge potential in terms of storing and processing power, is a highly developed technology which helps the IoT to partially solve its problems.…”
Section: Introductionmentioning
confidence: 99%