2018
DOI: 10.1109/access.2018.2809676
|View full text |Cite
|
Sign up to set email alerts
|

Infusion Auxiliary Service System Based on ZigBee Wireless Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Trust analysis is also introduced in cyber-physical systems (CPS), e.g., wireless sensor networks [88,89,90,91,92,93,94,95,96,97] and vehicular networks [98,99,100,101]. For example, a trust based framework is proposed to secure data aggregation in wireless sensor networks [102], which evaluates the trustworthiness of each sensor node by the Kullback-Leibler (KL) distance to identify the compromised nodes through an unsupervised learning technique.…”
Section: Trust In Cyber-physical and Edge Computing Systemsmentioning
confidence: 99%
“…Trust analysis is also introduced in cyber-physical systems (CPS), e.g., wireless sensor networks [88,89,90,91,92,93,94,95,96,97] and vehicular networks [98,99,100,101]. For example, a trust based framework is proposed to secure data aggregation in wireless sensor networks [102], which evaluates the trustworthiness of each sensor node by the Kullback-Leibler (KL) distance to identify the compromised nodes through an unsupervised learning technique.…”
Section: Trust In Cyber-physical and Edge Computing Systemsmentioning
confidence: 99%
“…Recently, trust was introduced in the concept of social cloud [20,21,22,23,24,25,26,27,28]. Trust is also introduced in cyber-physical and edge computing systems, e.g., wireless sensor networks [29,30,31,32,33,34,35,36,37,38] and vehicular networks [39,40,41,42]. Another important domain in which trust analysis is widely applied is Sybil defense and spam detection [43,3,44,16,45].…”
Section: Related Workmentioning
confidence: 99%