Articles with "tampering cheating" as a keyword



Photo by actuallyjoel from unsplash

Swarm-based defense technique for tampering and cheating attack in WSN using CPHS

Sign Up to like & get
recommendations!
Published in 2018 at "Personal and Ubiquitous Computing"

DOI: 10.1007/s00779-018-1162-1

Abstract: Nowadays, Wireless Sensor Networks (WSN) have been seen as one of the most essential technologies which play a vital role in several important areas, such as healthcare, military, critical infrastructure monitoring, environment monitoring, and manufacturing.… read more here.

Keywords: swarm based; tampering cheating; defense technique; trusted node ... See more keywords