2023
DOI: 10.1109/jsen.2023.3240386
|View full text |Cite
|
Sign up to set email alerts
|

Trust-Aware Virtual Network Embedding in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 48 publications
0
0
0
Order By: Relevance
“…For example, [31] establishes security levels for VNs, but does not consider the security of physical nodes and the underlying physical network. References [29] and [32] incorporate constraints on reputation or security level of physical nodes into the node importance ranking process. All the methods in [29], [31], [32] are designed for centralized VNE algorithms and rely on manually formulated node reliability assessment, which may not accurately reflect the actual network node situation and cannot ensure the security of VNE decisions.…”
Section: Security-aware Virtual Network Embedding Algorithmsmentioning
confidence: 99%
“…For example, [31] establishes security levels for VNs, but does not consider the security of physical nodes and the underlying physical network. References [29] and [32] incorporate constraints on reputation or security level of physical nodes into the node importance ranking process. All the methods in [29], [31], [32] are designed for centralized VNE algorithms and rely on manually formulated node reliability assessment, which may not accurately reflect the actual network node situation and cannot ensure the security of VNE decisions.…”
Section: Security-aware Virtual Network Embedding Algorithmsmentioning
confidence: 99%