Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing
by
Chen, Wei
, Liu, Yang
, Zhang Wuxiong
, Fang Weidong
, Tang Chaogang
in
Algorithms
/ Cloud computing
/ Computer networks
/ Computer simulation
/ Decision making
/ Energy consumption
/ Energy transmission
/ Management
/ Normal distribution
/ Real time
/ Remote sensors
/ Resource scheduling
/ Sensors
/ Survivability
/ Tradeoffs
/ Trustworthiness
/ Wireless networks
/ Wireless sensor networks
2020
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing
by
Chen, Wei
, Liu, Yang
, Zhang Wuxiong
, Fang Weidong
, Tang Chaogang
in
Algorithms
/ Cloud computing
/ Computer networks
/ Computer simulation
/ Decision making
/ Energy consumption
/ Energy transmission
/ Management
/ Normal distribution
/ Real time
/ Remote sensors
/ Resource scheduling
/ Sensors
/ Survivability
/ Tradeoffs
/ Trustworthiness
/ Wireless networks
/ Wireless sensor networks
2020
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing
by
Chen, Wei
, Liu, Yang
, Zhang Wuxiong
, Fang Weidong
, Tang Chaogang
in
Algorithms
/ Cloud computing
/ Computer networks
/ Computer simulation
/ Decision making
/ Energy consumption
/ Energy transmission
/ Management
/ Normal distribution
/ Real time
/ Remote sensors
/ Resource scheduling
/ Sensors
/ Survivability
/ Tradeoffs
/ Trustworthiness
/ Wireless networks
/ Wireless sensor networks
2020
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing
Journal Article
TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing
2020
Request Book From Autostore
and Choose the Collection Method
Overview
Based on fog computer, an industrial wireless sensor network (F-IWSN) is a novel wireless sensor network in the industry. It not only can more efficiently reduce information transmission latency, but also can more beneficially achieve the real-time control and the rapid resource scheduling. However, similar to other distributed networks, it also faces enormous security challenges, especially those internal attacks. The differences from those traditional security schemes are that, one is the trade-off between security, transmission performance and energy consumption to meet the requirements of information convergence and control, the other constructs a multi-dimensional selective forwarding scheme to achieve the real time transmission. In this paper, we propose a Gaussian distribution-based comprehensive trust management system (GDTMS) for F-IWSN. Furthermore, in its trust decision, the grey decision making is introduced to achieve the trade-off between security, transmission performance and energy consumption. The proposed trade-off can effectively select the secure and robust relay node, namely, a trust management-based secure routing scheme. In addition, the proposed schemes are also applicable to defending against bad mouthing attacks. Simulation results show that, the comprehensive performance of GDTMS is better than other similar algorithms. It can effectively prevent the appearance of network holes, and balance the network load, promote the survivability of the network.
Publisher
Springer Nature B.V
Subject
/ Sensors
This website uses cookies to ensure you get the best experience on our website.