The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2013
DOI: 10.1007/978-3-642-37949-9_65
|View full text |Cite
|
Sign up to set email alerts
|

Outlier Detection and Treatment for Lightweight Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
2

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 24 publications
0
10
0
Order By: Relevance
“…This work is an extension to the work done by Kumar et al [1] [2] Where cryptographic property, availability, is ensured for an RFID-WSN through outlier detection mechanism. Detection of unprecedented data identified from resource constraint mobile sensor devices is proposed.…”
Section: Introductionmentioning
confidence: 93%
See 3 more Smart Citations
“…This work is an extension to the work done by Kumar et al [1] [2] Where cryptographic property, availability, is ensured for an RFID-WSN through outlier detection mechanism. Detection of unprecedented data identified from resource constraint mobile sensor devices is proposed.…”
Section: Introductionmentioning
confidence: 93%
“…Level of access rights help to measure the significance of data sharing and mechanism like fine-grained access control is developed to clarify the controls. Fine-grained access control mechanisms can be classified as attribute based techniques, Identity based techniques, and Role-based techniques [1] [2]. In [11], it is observed that formal methods play an important role to check the mistakes in defining the policies that may arise due to expressiveness property of policies.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Lightweight cryptography can be classified into primitives and protocols. The goal of lightweight primitives is to achieve confidentiality, integrity, authentication, availability, and nonrepudiation [6]. Lightweight primitives can be classified as being either symmetric or asymmetric.…”
Section: Lightweight Cryptographymentioning
confidence: 99%