2019
DOI: 10.1186/s13673-019-0183-8
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based recommendation systems in Internet of Things: a systematic literature review

Abstract: During the past decades, in the era of wireless communications and embedded system, the concept of the Internet of Things (IoT) was first presented by Kevin Ashton in the year 1999 [1]. Along with the tremendous growth in the number of sensing devices connected to the Internet, we were a witness of emerging IoT into healthcare, transportation system, smart cities, agriculture, and other enterprises. The IoT benefits cooperation of diverse computing systems such as sensors and smart devices to cloud computers. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
57
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 110 publications
(61 citation statements)
references
References 131 publications
0
57
0
2
Order By: Relevance
“…However, in this process, if the first extraction information and the next one are the same, all three bytes of the extraction data are duplicated. For example, when the least significant byte arr [19] of the cipher text is 0x42, the extraction information is 0x02, which is LSB 4-bit, and the first extraction data is arr [2]. Then, LSB 4-bit of arr [2] is the second extraction information.…”
Section: Vulnerabilities In Otp Extractionmentioning
confidence: 99%
See 4 more Smart Citations
“…However, in this process, if the first extraction information and the next one are the same, all three bytes of the extraction data are duplicated. For example, when the least significant byte arr [19] of the cipher text is 0x42, the extraction information is 0x02, which is LSB 4-bit, and the first extraction data is arr [2]. Then, LSB 4-bit of arr [2] is the second extraction information.…”
Section: Vulnerabilities In Otp Extractionmentioning
confidence: 99%
“…For example, when the least significant byte arr [19] of the cipher text is 0x42, the extraction information is 0x02, which is LSB 4-bit, and the first extraction data is arr [2]. Then, LSB 4-bit of arr [2] is the second extraction information. At this time, if the LSB 4-bit of arr [2] is also 0x02, the second extracted data is arr [2] again.…”
Section: Vulnerabilities In Otp Extractionmentioning
confidence: 99%
See 3 more Smart Citations