Login / Signup

DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks.

Zuchao MaLiang LiuWeizhi Meng
Published in: ACISP (2020)
Keyphrases
  • malicious nodes
  • network nodes
  • wireless sensor networks
  • computer networks
  • spectrum sensing
  • malicious behavior
  • black hole
  • social networks
  • sensor networks
  • mobile phone
  • ad hoc networks
  • key management