Search citation statements

Order By: Relevance
Select...
2
1
1
1
0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

0
8
0
Order By: Relevance
“…Sathyadevan et al [28] have introduced an authentication scheme using key generation technique exclusively meant for edge computing IoT device. Trust-based security scheme using provisioning approach was presented by Dass et al [29] considering transport system in IoT. Agiollo et al [30] have presented a unique scheme of identification of routing attack when standard RPL is deployed in IoT.…”
Section: Related Workmentioning
“…Moreover, the AI component is helpful to predict about some threats, like chances of road accidents, traffic congestion in a street, and available best routes. For the ITS system, it is better to deploy a consortium kind of blockchain as it fulfils most of the requirements of the system [30,31].…”
Section: Intelligent Transportationmentioning
“…Among research on IoT dependability, we found five studies that present mathematical approaches to measuring system reliability and availability [79][80][81][82][83]. In contrast, two others propose a calculus to estimate a confidence score to sensors [41], [84], and users [85]. We also found a proposal for an optimization approach for some dependability characteristics [86] and a theoretical approach based on Markov models to deal with vulnerabilities in a healthcare system [87].…”
Section: ) Mathematical Approachmentioning
“…Unknown sensors can transmit non-authentic data with information that differs from the application context [97]. One way to deal with unreliable sensors in IoT is through the traceability of transmitted data [73] or by verifying the behavior of network sensors' energy consumption [84]. When there is a lack of data authenticity, integrity is not necessarily compromised, as the data is not corrupted or altered but fabricated.…”
Section: ) Securitymentioning
“…This mechanism could distinguish compromised and malicious nodes and decrease the energy consumption of the entire network. Dass et al [26] proposed a trust evaluation model to compute the trustworthiness of the data generated from the participating nodes in an intelligent transport system. They considered direct and indirect trust mechanisms for each of the sensor nodes and update their trust measures at regular intervals of time.…”
Section: Related Workmentioning