Journal ArticleDOI
Reputation-based role assignment for role-based access control in wireless sensor networks
Sudip Misra,Ankur Vaish +1 more
Reads0
Chats0
TLDR
The main objective of this scheme is to manage reputation locally with minimum communication and delay overhead and to assign appropriate role or level to the deserved nodes in order to increase the throughput of overall network.About:Â
This article is published in Computer Communications.The article was published on 2011-03-01. It has received 69 citations till now. The article focuses on the topics: Key distribution in wireless sensor networks & Wireless network.read more
Citations
More filters
Journal ArticleDOI
Wireless sensor networks for agriculture
TL;DR: The existing state-of-the-art in wireless sensor networks for agricultural applications is reviewed thoroughly and various case studies to thoroughly explore the existing solutions proposed in the literature in various categories according to their design and implementation related parameters.
Journal ArticleDOI
A Comprehensive Study of Security of Internet-of-Things
Arsalan Mosenia,Niraj K. Jha +1 more
TL;DR: This survey attempts to provide a comprehensive list of vulnerabilities and countermeasures against them on the edge-side layer of IoT, which consists of three levels: (i) edge nodes, (ii) communication, and (iii) edge computing.
Journal ArticleDOI
Review: The role of communication systems in smart grids: Architectures, technical solutions and research challenges
TL;DR: The fundamental research challenges in this field including communication reliability and timeliness, QoS support, data management services, and autonomic behaviors are introduced and the main solutions proposed in the literature for each are discussed.
Journal ArticleDOI
Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks
Shahaboddin Shamshirband,Shahaboddin Shamshirband,Ahmed Patel,Ahmed Patel,Nor Badrul Anuar,Miss Laiha Mat Kiah,Ajith Abraham +6 more
TL;DR: The proposed cooperative Game-based Fuzzy Q-learning (G-FQL) model implements cooperative defense counter-attack scenarios for the sink node and the base station to operate as rational decision-maker players through a game theory strategy, and yields a greater improvement than existing machine learning methods.
Journal ArticleDOI
Cluster-Based Consensus Time Synchronization for Wireless Sensor Networks
TL;DR: The simulation results show that the proposed algorithm reduces the communication traffic compared with the DCTS algorithm, and improves the convergence rate due to the combination of clustering topologies.
References
More filters
Journal ArticleDOI
A survey on sensor networks
TL;DR: The current state of the art of sensor networks is captured in this article, where solutions are discussed under their related protocol stack layer sections.
Journal ArticleDOI
The capacity of wireless networks
Piyush Gupta,P. R. Kumar +1 more
TL;DR: When n identical randomly located nodes, each capable of transmitting at W bits per second and using a fixed range, form a wireless network, the throughput /spl lambda/(n) obtainable by each node for a randomly chosen destination is /spl Theta/(W//spl radic/(nlogn)) bits persecond under a noninterference protocol.
Proceedings ArticleDOI
A key-management scheme for distributed sensor networks
TL;DR: A key-management scheme designed to satisfy both operational and security requirements of DSNs is presented, which relies on probabilistic key sharing among the nodes of a random graph and uses simple protocols for shared-key discovery and path-key establishment, and for key revocation, re-keying, and incremental addition of nodes.
Proceedings ArticleDOI
The Eigentrust algorithm for reputation management in P2P networks
TL;DR: An algorithm to decrease the number of downloads of inauthentic files in a peer-to-peer file-sharing network that assigns each peer a unique global trust value, based on the peer's history of uploads is described.
Proceedings ArticleDOI
Random key predistribution schemes for sensor networks
TL;DR: The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.