2022
DOI: 10.1109/tbdata.2018.2811501
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(22 citation statements)
references
References 33 publications
0
22
0
Order By: Relevance
“…We further find 7 studies with or more than 30 citations. These studies are [26], [39], [45], [46], [53], [55], [58]. Generally, the overall number of citations for the selected studies is 675, and the average citations per paper is 16.46.…”
Section: ) Citation Impactmentioning
confidence: 99%
“…We further find 7 studies with or more than 30 citations. These studies are [26], [39], [45], [46], [53], [55], [58]. Generally, the overall number of citations for the selected studies is 675, and the average citations per paper is 16.46.…”
Section: ) Citation Impactmentioning
confidence: 99%
“…Q represents the FHMM algorithm, which decides the mapping between the observed state and switch state. 1) As the mapping between the observed state and switch state in the FHMM can be seen as a linear mapping, we have (D') D' Q k b  (12) () Q D kD b  (13) ' D D D    (14) k and b are linear parameters and  represent the correction coefficient.…”
Section: Proofmentioning
confidence: 99%
“…In fact, there is a significant body of work analyzing the users' privacy-preservation [9][10][11][12][13]. The major privacy-preserving solutions can be classified into homomorphic encryption [42] [43], flattening energy signatures by batterybased load hiding (BLH) [16][17][18][19][20][21] and noise addition [22][23][24].…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, when the data itself is insecure, which may include trust spoof attacks and replicated-sink attacks, the data collection needs to identify whether such data could be received. Wang et al [43] proposed a trust evaluation scheme to ensure the trustworthiness of sensors and mobile sinks, which protects the system from trust spoof attacks and replicated-sink attacks.…”
Section: Related Workmentioning
confidence: 99%