2022
DOI: 10.3390/s23010099
|View full text |Cite
|
Sign up to set email alerts
|

EMS: Efficient Monitoring System to Detect Non-Cooperative Nodes in IoT-Based Vehicular Delay Tolerant Networks (VDTNs)

Abstract: Since several Internet of Things (IoT) applications have been widely deployed on unstable wireless networks, such as the Delay Tolerant Network (DTN), data communication efficiency in DTN remains a challenge for IoT applications. Vehicular Delay Tolerant Network (VDTN) has become one of DTN’s potential applications, in which the network experiences connectivity interruption due to the lack of an end-to-end relay route. VDTNs focus on node cooperation to achieve this goal. As a result, it is essential to ensure… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…In Ref. [8], the authors proposed an efficient monitoring system called EMS to detect non-cooperative nodes in IoT-based vehicular delay-tolerant networks (VDTNs). EMS utilizes a combination of machine learning [9] and statistical analysis techniques and achieves high accuracy in detecting non-cooperative nodes in VDTNs.…”
Section: Related Work 21 Collaborative Optimization For Trams and CVmentioning
confidence: 99%
“…In Ref. [8], the authors proposed an efficient monitoring system called EMS to detect non-cooperative nodes in IoT-based vehicular delay-tolerant networks (VDTNs). EMS utilizes a combination of machine learning [9] and statistical analysis techniques and achieves high accuracy in detecting non-cooperative nodes in VDTNs.…”
Section: Related Work 21 Collaborative Optimization For Trams and CVmentioning
confidence: 99%
“…The Internet of Things (IoT) devices have similar resource constraints (e.g., energy, computation, and storage capacity) to the automotive ECUs [7,8]. The Trusted Computing Group (TCG) has released a reference report [9] describing how secure software and firmware update for embedded systems can be performed using trusted computing technologies.…”
Section: Related Workmentioning
confidence: 99%
“…Conversely, the efficiency of utilizing the abundant spectrum remains suboptimal. Cognitive radio (CR) emerges as an innovative approach to address the scarcity of spectrum resources [3][4][5][6][7][8]. In CR networks, cognitive users (CUs) are authorized to use frequency bands designated for primary users (PUs) for communication, ensuring minimal interference to PUs.…”
Section: Introductionmentioning
confidence: 99%