The double-edged sword: Revealing the critical role of structural hole in forming trust for securing Wireless sensor networks.
Ming XiangWilliam LiuQuan BaiAdnan Al-AnbukyPublished in: ITNAC (2015)
Keyphrases
- wireless sensor networks
- structural information
- energy efficient
- energy consumption
- data sets
- data aggregation
- base station
- multi hop
- sensor networks
- wireless communication
- routing algorithm
- trust model
- data transmission
- trust relationships
- environmental monitoring
- resource constrained
- knowledge sharing
- routing protocol
- recommender systems
- neural network