2021
DOI: 10.1016/j.compeleceng.2021.107130
|View full text |Cite
|
Sign up to set email alerts
|

Trust aggregation authentication protocol using machine learning for IoT wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 6 publications
0
13
0
Order By: Relevance
“…3 The block construction equipment is bound to the Eq-DataModel according to the method of automatic matching of data features or manual matching. Through a series of established rules or processes such as rule expression, heterogeneous data analysis and field mapping processing, the real-time data, attribute information and so on obtained by the model are generalized and parsed into readable JSON data with the same structure and format, which are stored as main parameters [21]. After the equipment binding is completed, the data flows normally.…”
Section: Implementation Methods Of the Equipment Data Modelmentioning
confidence: 99%
“…3 The block construction equipment is bound to the Eq-DataModel according to the method of automatic matching of data features or manual matching. Through a series of established rules or processes such as rule expression, heterogeneous data analysis and field mapping processing, the real-time data, attribute information and so on obtained by the model are generalized and parsed into readable JSON data with the same structure and format, which are stored as main parameters [21]. After the equipment binding is completed, the data flows normally.…”
Section: Implementation Methods Of the Equipment Data Modelmentioning
confidence: 99%
“…Authors of [14] have focused on the trust aggregation authentication protocol based on the machine learning technique. The total trust value for the internet gateways is taken for each device using its behavior and data trust value.…”
Section: Related Workmentioning
confidence: 99%
“…The belief function, calculated using the recommendation function along with the confidence function (as an add-on function), defines how the cumulative trust value is applied to a node. [12] Furthermore, the function of a selected grouping is determined by the context of the relationship between the nodes. This manuscript employs a fully weighted approach [36].…”
Section: Trust Computation Using An Aggregate Functionmentioning
confidence: 99%
“…Because all nodes in the network inspect it, the node with the highest cumulative value of trust is chosen for data transmission. Since this method points out the most trusted node, it helps in the removal of confusion for selecting nodes for secure transmission [12].…”
Section: Trust Computation Using Cumulated Trust Valuementioning
confidence: 99%