2021
DOI: 10.32604/cmc.2021.015259
|View full text |Cite
|
Sign up to set email alerts
|

Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 66 publications
(31 citation statements)
references
References 19 publications
0
31
0
Order By: Relevance
“…Hriez et al proposed a software measurement method to scientifically organize the whole process of software and also proposed a method that can be used for many times in this process [4]. Shahid et al proposed the rationality of assumptions required by the MMV model combined with sparse reconstruction, that is, when multiple observation signals share a sparse structure, the MMV model is superior to the SMV model [5]. Qi et al proposed a feature extraction method for mechanical faults based on category-independent component analysis and the correlation coefficient.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Hriez et al proposed a software measurement method to scientifically organize the whole process of software and also proposed a method that can be used for many times in this process [4]. Shahid et al proposed the rationality of assumptions required by the MMV model combined with sparse reconstruction, that is, when multiple observation signals share a sparse structure, the MMV model is superior to the SMV model [5]. Qi et al proposed a feature extraction method for mechanical faults based on category-independent component analysis and the correlation coefficient.…”
Section: Literature Reviewmentioning
confidence: 99%
“…e reconstructed δ l is expanded according to the N y column and the N z row to obtain the reconstructed target image. e imaging reconstruction process represented by formula (5) only utilizes the measured data of a single polarization channel, without considering the correlation of the measured data of each polarization channel, so the imaging reconstruction effect achieved is very limited.…”
Section: Polarization Gpr Imaging Based On the Smv Modelmentioning
confidence: 99%
“…The ESWI algorithm detects suspicious nodes using transmission‐time information. Wormholes are detected by counting hops and calculating hop intervals 14 . It is energy efficient, and the precise values of the true‐positive and false‐positive detection rates are provided.…”
Section: Wormhole Mitigation Schemesmentioning
confidence: 99%
“…The tool by Microsoft allows for integration with another Microsoft application, Excel, which enables users to connect the two services for instant data transfer, compilation and analysis. Besides Excel, other enterprise resource planning systems that may connect to Microsoft Power BI include MS Dynamics NAV, Navision, and SAP [55]. The customisable dashboard provides and streams data analytics and visualisation in real-time to produce interactive visual reports of the data with its high data refreshing rates.…”
Section: Microsoft Power Bimentioning
confidence: 99%