Login / Signup
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks.
Zuchao Ma
Liang Liu
Weizhi Meng
Published in:
ACISP (2020)
Keyphrases
</>
malicious nodes
network nodes
wireless sensor networks
computer networks
spectrum sensing
malicious behavior
black hole
social networks
sensor networks
mobile phone
ad hoc networks
key management