Dragon Fly Algorithm based Approach for escalating the security among the nodes in Wireless Sensor Network based System Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.21203/rs.3.rs-3339411/v1
For specific intercommunication applications, latest advancements in technology and manufacturing have made it feasible to create substantial, significant, energy-efficient and cost-effective sensor nodes having the features like adaptability, self fulfillness, and self evolvability. In sensor networks for sustainable development, it is looked at how sensor network technologies increase social development and living quality while having little to no detrimental effects on the environment or the planet's natural resources. A wide range of applications, including the military, healthcare, traffic monitoring, and remote image sensing, benefit from the use of wireless sensor networks (WSNs). Due to the limits of sensor networks, different levels of security are required for these crucial applications, making it challenging to employ traditional algorithms. Security has arisen as one of the main problems with IoT and smart city applications, and sensor networks are also considered of as the backbone of IoTs and smart cities. Complex issues like energy consumption are covered by the WSN, making it a useful tool for selecting clusters. By injecting false and harmful data into the network and launching internal attacks, hostile nodes might quickly jeopardize its integrity. Rogue nodes will be identified using trust-based security to offer a powerful and mobile defense. Trust evaluation models are a key technique for enhancing security in Wireless Sensor Networks by enhancing dependability (cooperation) among sensor nodes. This study recommends the cutting-edge trust algorithm DFA U-Trust to address the security requirements of WSNs.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- https://doi.org/10.21203/rs.3.rs-3339411/v1
- https://www.researchsquare.com/article/rs-3339411/latest.pdf
- OA Status
- gold
- References
- 31
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4386784376
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4386784376Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.21203/rs.3.rs-3339411/v1Digital Object Identifier
- Title
-
Dragon Fly Algorithm based Approach for escalating the security among the nodes in Wireless Sensor Network based SystemWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-09-15Full publication date if available
- Authors
-
Shweta Sharma, Amandeep Kaur, Deepali Gupta, Sapna Juneja, Shilpa Saini, Mukesh KumarList of authors in order
- Landing page
-
https://doi.org/10.21203/rs.3.rs-3339411/v1Publisher landing page
- PDF URL
-
https://www.researchsquare.com/article/rs-3339411/latest.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.researchsquare.com/article/rs-3339411/latest.pdfDirect OA link when available
- Concepts
-
Wireless sensor network, Computer science, Dependability, Key distribution in wireless sensor networks, Computer security, Adaptability, Computer network, Wireless network, Wireless, Telecommunications, Software engineering, Ecology, BiologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
31Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4386784376 |
|---|---|
| doi | https://doi.org/10.21203/rs.3.rs-3339411/v1 |
| ids.doi | https://doi.org/10.21203/rs.3.rs-3339411/v1 |
| ids.openalex | https://openalex.org/W4386784376 |
| fwci | 0.0 |
| type | preprint |
| title | Dragon Fly Algorithm based Approach for escalating the security among the nodes in Wireless Sensor Network based System |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11498 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9984999895095825 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Security in Wireless Sensor Networks |
| topics[1].id | https://openalex.org/T10080 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9984999895095825 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Energy Efficient Wireless Sensor Networks |
| topics[2].id | https://openalex.org/T10273 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9980999827384949 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | IoT and Edge/Fog Computing |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C24590314 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8067619800567627 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q336038 |
| concepts[0].display_name | Wireless sensor network |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.7020120024681091 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C77019957 |
| concepts[2].level | 2 |
| concepts[2].score | 0.5465493202209473 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q2689057 |
| concepts[2].display_name | Dependability |
| concepts[3].id | https://openalex.org/C41971633 |
| concepts[3].level | 4 |
| concepts[3].score | 0.4809390902519226 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q6398155 |
| concepts[3].display_name | Key distribution in wireless sensor networks |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.468462198972702 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C177606310 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4227524697780609 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q5674297 |
| concepts[5].display_name | Adaptability |
| concepts[6].id | https://openalex.org/C31258907 |
| concepts[6].level | 1 |
| concepts[6].score | 0.4138754606246948 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[6].display_name | Computer network |
| concepts[7].id | https://openalex.org/C108037233 |
| concepts[7].level | 3 |
| concepts[7].score | 0.3086932897567749 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q11375 |
| concepts[7].display_name | Wireless network |
| concepts[8].id | https://openalex.org/C555944384 |
| concepts[8].level | 2 |
| concepts[8].score | 0.3057449162006378 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q249 |
| concepts[8].display_name | Wireless |
| concepts[9].id | https://openalex.org/C76155785 |
| concepts[9].level | 1 |
| concepts[9].score | 0.09647226333618164 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q418 |
| concepts[9].display_name | Telecommunications |
| concepts[10].id | https://openalex.org/C115903868 |
| concepts[10].level | 1 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q80993 |
| concepts[10].display_name | Software engineering |
| concepts[11].id | https://openalex.org/C18903297 |
| concepts[11].level | 1 |
| concepts[11].score | 0.0 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q7150 |
| concepts[11].display_name | Ecology |
| concepts[12].id | https://openalex.org/C86803240 |
| concepts[12].level | 0 |
| concepts[12].score | 0.0 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[12].display_name | Biology |
| keywords[0].id | https://openalex.org/keywords/wireless-sensor-network |
| keywords[0].score | 0.8067619800567627 |
| keywords[0].display_name | Wireless sensor network |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.7020120024681091 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/dependability |
| keywords[2].score | 0.5465493202209473 |
| keywords[2].display_name | Dependability |
| keywords[3].id | https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks |
| keywords[3].score | 0.4809390902519226 |
| keywords[3].display_name | Key distribution in wireless sensor networks |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.468462198972702 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/adaptability |
| keywords[5].score | 0.4227524697780609 |
| keywords[5].display_name | Adaptability |
| keywords[6].id | https://openalex.org/keywords/computer-network |
| keywords[6].score | 0.4138754606246948 |
| keywords[6].display_name | Computer network |
| keywords[7].id | https://openalex.org/keywords/wireless-network |
| keywords[7].score | 0.3086932897567749 |
| keywords[7].display_name | Wireless network |
| keywords[8].id | https://openalex.org/keywords/wireless |
| keywords[8].score | 0.3057449162006378 |
| keywords[8].display_name | Wireless |
| keywords[9].id | https://openalex.org/keywords/telecommunications |
| keywords[9].score | 0.09647226333618164 |
| keywords[9].display_name | Telecommunications |
| language | en |
| locations[0].id | doi:10.21203/rs.3.rs-3339411/v1 |
| locations[0].is_oa | True |
| locations[0].source | |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.researchsquare.com/article/rs-3339411/latest.pdf |
| locations[0].version | acceptedVersion |
| locations[0].raw_type | posted-content |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | https://doi.org/10.21203/rs.3.rs-3339411/v1 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5083428307 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-3687-9956 |
| authorships[0].author.display_name | Shweta Sharma |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I74319210 |
| authorships[0].affiliations[0].raw_affiliation_string | Chitkara University Institute of Engineering & Technology, Chitkara University |
| authorships[0].institutions[0].id | https://openalex.org/I74319210 |
| authorships[0].institutions[0].ror | https://ror.org/057d6z539 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I74319210 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Chitkara University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Shweta Sharma |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Chitkara University Institute of Engineering & Technology, Chitkara University |
| authorships[1].author.id | https://openalex.org/A5009241024 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-7282-8902 |
| authorships[1].author.display_name | Amandeep Kaur |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I74319210 |
| authorships[1].affiliations[0].raw_affiliation_string | Chitkara University Institute of Engineering & Technology, Chitkara University |
| authorships[1].institutions[0].id | https://openalex.org/I74319210 |
| authorships[1].institutions[0].ror | https://ror.org/057d6z539 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I74319210 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Chitkara University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Amandeep Kaur |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Chitkara University Institute of Engineering & Technology, Chitkara University |
| authorships[2].author.id | https://openalex.org/A5055907404 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-3207-5248 |
| authorships[2].author.display_name | Deepali Gupta |
| authorships[2].countries | IN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I74319210 |
| authorships[2].affiliations[0].raw_affiliation_string | Chitkara University Institute of Engineering & Technology, Chitkara University |
| authorships[2].institutions[0].id | https://openalex.org/I74319210 |
| authorships[2].institutions[0].ror | https://ror.org/057d6z539 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I74319210 |
| authorships[2].institutions[0].country_code | IN |
| authorships[2].institutions[0].display_name | Chitkara University |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Deepali Gupta |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | Chitkara University Institute of Engineering & Technology, Chitkara University |
| authorships[3].author.id | https://openalex.org/A5048859324 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Sapna Juneja |
| authorships[3].countries | IN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I4210094618 |
| authorships[3].affiliations[0].raw_affiliation_string | KIET Group of Institutions |
| authorships[3].institutions[0].id | https://openalex.org/I4210094618 |
| authorships[3].institutions[0].ror | https://ror.org/00m02ap37 |
| authorships[3].institutions[0].type | education |
| authorships[3].institutions[0].lineage | https://openalex.org/I4210094618 |
| authorships[3].institutions[0].country_code | IN |
| authorships[3].institutions[0].display_name | CT Group Of Institutions |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Sapna Juneja |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | KIET Group of Institutions |
| authorships[4].author.id | https://openalex.org/A5031145095 |
| authorships[4].author.orcid | |
| authorships[4].author.display_name | Shilpa Saini |
| authorships[4].countries | IN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I101407740 |
| authorships[4].affiliations[0].raw_affiliation_string | Chandigarh University |
| authorships[4].institutions[0].id | https://openalex.org/I101407740 |
| authorships[4].institutions[0].ror | https://ror.org/05t4pvx35 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I101407740 |
| authorships[4].institutions[0].country_code | IN |
| authorships[4].institutions[0].display_name | Chandigarh University |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Shilpa Saini |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | Chandigarh University |
| authorships[5].author.id | https://openalex.org/A5100707370 |
| authorships[5].author.orcid | https://orcid.org/0000-0001-6345-3136 |
| authorships[5].author.display_name | Mukesh Kumar |
| authorships[5].countries | ET |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I4210122757 |
| authorships[5].affiliations[0].raw_affiliation_string | Assosa University |
| authorships[5].institutions[0].id | https://openalex.org/I4210122757 |
| authorships[5].institutions[0].ror | https://ror.org/02nkn4852 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I4210122757 |
| authorships[5].institutions[0].country_code | ET |
| authorships[5].institutions[0].display_name | Asossa University |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Mukesh Kumar |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | Assosa University |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.researchsquare.com/article/rs-3339411/latest.pdf |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Dragon Fly Algorithm based Approach for escalating the security among the nodes in Wireless Sensor Network based System |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11498 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9984999895095825 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Security in Wireless Sensor Networks |
| related_works | https://openalex.org/W1965229852, https://openalex.org/W2113861813, https://openalex.org/W2052839206, https://openalex.org/W564976513, https://openalex.org/W2152682097, https://openalex.org/W2373706680, https://openalex.org/W2128710076, https://openalex.org/W4364295257, https://openalex.org/W2602139996, https://openalex.org/W2785477058 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.21203/rs.3.rs-3339411/v1 |
| best_oa_location.is_oa | True |
| best_oa_location.source | |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.researchsquare.com/article/rs-3339411/latest.pdf |
| best_oa_location.version | acceptedVersion |
| best_oa_location.raw_type | posted-content |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | https://doi.org/10.21203/rs.3.rs-3339411/v1 |
| primary_location.id | doi:10.21203/rs.3.rs-3339411/v1 |
| primary_location.is_oa | True |
| primary_location.source | |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.researchsquare.com/article/rs-3339411/latest.pdf |
| primary_location.version | acceptedVersion |
| primary_location.raw_type | posted-content |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | https://doi.org/10.21203/rs.3.rs-3339411/v1 |
| publication_date | 2023-09-15 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W6632655949, https://openalex.org/W2887875581, https://openalex.org/W2130403046, https://openalex.org/W2050067204, https://openalex.org/W2061920251, https://openalex.org/W2172333777, https://openalex.org/W2609711984, https://openalex.org/W2911666054, https://openalex.org/W3000006428, https://openalex.org/W2112235623, https://openalex.org/W2807201721, https://openalex.org/W2767583603, https://openalex.org/W2914295391, https://openalex.org/W2884047573, https://openalex.org/W3118592848, https://openalex.org/W3151838147, https://openalex.org/W2008337238, https://openalex.org/W2136259338, https://openalex.org/W1489202021, https://openalex.org/W2024759950, https://openalex.org/W2160092409, https://openalex.org/W2586333506, https://openalex.org/W2784309899, https://openalex.org/W4296482002, https://openalex.org/W4213158823, https://openalex.org/W3134177398, https://openalex.org/W3102016355, https://openalex.org/W4306403498, https://openalex.org/W2766376114, https://openalex.org/W1546861797, https://openalex.org/W2480020364 |
| referenced_works_count | 31 |
| abstract_inverted_index.A | 69 |
| abstract_inverted_index.a | 159, 195, 204 |
| abstract_inverted_index.By | 165 |
| abstract_inverted_index.In | 34 |
| abstract_inverted_index.as | 120, 139 |
| abstract_inverted_index.at | 43 |
| abstract_inverted_index.be | 188 |
| abstract_inverted_index.by | 154, 214 |
| abstract_inverted_index.in | 7, 210 |
| abstract_inverted_index.is | 41 |
| abstract_inverted_index.it | 13, 40, 111, 158 |
| abstract_inverted_index.no | 58 |
| abstract_inverted_index.of | 72, 88, 97, 102, 122, 138, 142, 235 |
| abstract_inverted_index.on | 61 |
| abstract_inverted_index.or | 64 |
| abstract_inverted_index.to | 15, 57, 94, 113, 193, 230 |
| abstract_inverted_index.DFA | 228 |
| abstract_inverted_index.Due | 93 |
| abstract_inverted_index.For | 1 |
| abstract_inverted_index.IoT | 127 |
| abstract_inverted_index.and | 9, 20, 31, 51, 80, 128, 132, 144, 168, 174, 197 |
| abstract_inverted_index.are | 104, 135, 152, 203 |
| abstract_inverted_index.for | 37, 106, 162, 207 |
| abstract_inverted_index.has | 118 |
| abstract_inverted_index.how | 44 |
| abstract_inverted_index.its | 183 |
| abstract_inverted_index.key | 205 |
| abstract_inverted_index.one | 121 |
| abstract_inverted_index.the | 25, 62, 65, 75, 86, 95, 123, 140, 155, 172, 224, 232 |
| abstract_inverted_index.use | 87 |
| abstract_inverted_index.IoTs | 143 |
| abstract_inverted_index.This | 221 |
| abstract_inverted_index.WSN, | 156 |
| abstract_inverted_index.also | 136 |
| abstract_inverted_index.city | 130 |
| abstract_inverted_index.data | 170 |
| abstract_inverted_index.from | 85 |
| abstract_inverted_index.have | 11 |
| abstract_inverted_index.into | 171 |
| abstract_inverted_index.like | 27, 149 |
| abstract_inverted_index.made | 12 |
| abstract_inverted_index.main | 124 |
| abstract_inverted_index.self | 29, 32 |
| abstract_inverted_index.tool | 161 |
| abstract_inverted_index.wide | 70 |
| abstract_inverted_index.will | 187 |
| abstract_inverted_index.with | 126 |
| abstract_inverted_index.Rogue | 185 |
| abstract_inverted_index.Trust | 200 |
| abstract_inverted_index.WSNs. | 236 |
| abstract_inverted_index.among | 218 |
| abstract_inverted_index.false | 167 |
| abstract_inverted_index.image | 82 |
| abstract_inverted_index.might | 180 |
| abstract_inverted_index.nodes | 23, 179, 186 |
| abstract_inverted_index.offer | 194 |
| abstract_inverted_index.range | 71 |
| abstract_inverted_index.smart | 129, 145 |
| abstract_inverted_index.study | 222 |
| abstract_inverted_index.these | 107 |
| abstract_inverted_index.trust | 226 |
| abstract_inverted_index.using | 190 |
| abstract_inverted_index.while | 54 |
| abstract_inverted_index.Sensor | 212 |
| abstract_inverted_index.arisen | 119 |
| abstract_inverted_index.create | 16 |
| abstract_inverted_index.employ | 114 |
| abstract_inverted_index.energy | 150 |
| abstract_inverted_index.having | 24, 55 |
| abstract_inverted_index.issues | 148 |
| abstract_inverted_index.latest | 5 |
| abstract_inverted_index.levels | 101 |
| abstract_inverted_index.limits | 96 |
| abstract_inverted_index.little | 56 |
| abstract_inverted_index.living | 52 |
| abstract_inverted_index.looked | 42 |
| abstract_inverted_index.making | 110, 157 |
| abstract_inverted_index.mobile | 198 |
| abstract_inverted_index.models | 202 |
| abstract_inverted_index.nodes. | 220 |
| abstract_inverted_index.remote | 81 |
| abstract_inverted_index.sensor | 22, 35, 45, 90, 98, 133, 219 |
| abstract_inverted_index.social | 49 |
| abstract_inverted_index.useful | 160 |
| abstract_inverted_index.(WSNs). | 92 |
| abstract_inverted_index.Complex | 147 |
| abstract_inverted_index.U-Trust | 229 |
| abstract_inverted_index.address | 231 |
| abstract_inverted_index.benefit | 84 |
| abstract_inverted_index.cities. | 146 |
| abstract_inverted_index.covered | 153 |
| abstract_inverted_index.crucial | 108 |
| abstract_inverted_index.effects | 60 |
| abstract_inverted_index.harmful | 169 |
| abstract_inverted_index.hostile | 178 |
| abstract_inverted_index.natural | 67 |
| abstract_inverted_index.network | 46, 173 |
| abstract_inverted_index.quality | 53 |
| abstract_inverted_index.quickly | 181 |
| abstract_inverted_index.traffic | 78 |
| abstract_inverted_index.Networks | 213 |
| abstract_inverted_index.Security | 117 |
| abstract_inverted_index.Wireless | 211 |
| abstract_inverted_index.attacks, | 177 |
| abstract_inverted_index.backbone | 141 |
| abstract_inverted_index.defense. | 199 |
| abstract_inverted_index.feasible | 14 |
| abstract_inverted_index.features | 26 |
| abstract_inverted_index.increase | 48 |
| abstract_inverted_index.internal | 176 |
| abstract_inverted_index.networks | 36, 91, 134 |
| abstract_inverted_index.planet's | 66 |
| abstract_inverted_index.powerful | 196 |
| abstract_inverted_index.problems | 125 |
| abstract_inverted_index.required | 105 |
| abstract_inverted_index.security | 103, 192, 209, 233 |
| abstract_inverted_index.sensing, | 83 |
| abstract_inverted_index.specific | 2 |
| abstract_inverted_index.wireless | 89 |
| abstract_inverted_index.algorithm | 227 |
| abstract_inverted_index.clusters. | 164 |
| abstract_inverted_index.different | 100 |
| abstract_inverted_index.enhancing | 208, 215 |
| abstract_inverted_index.including | 74 |
| abstract_inverted_index.injecting | 166 |
| abstract_inverted_index.launching | 175 |
| abstract_inverted_index.military, | 76 |
| abstract_inverted_index.networks, | 99 |
| abstract_inverted_index.selecting | 163 |
| abstract_inverted_index.technique | 206 |
| abstract_inverted_index.considered | 137 |
| abstract_inverted_index.evaluation | 201 |
| abstract_inverted_index.identified | 189 |
| abstract_inverted_index.integrity. | 184 |
| abstract_inverted_index.jeopardize | 182 |
| abstract_inverted_index.recommends | 223 |
| abstract_inverted_index.resources. | 68 |
| abstract_inverted_index.technology | 8 |
| abstract_inverted_index.algorithms. | 116 |
| abstract_inverted_index.challenging | 112 |
| abstract_inverted_index.consumption | 151 |
| abstract_inverted_index.detrimental | 59 |
| abstract_inverted_index.development | 50 |
| abstract_inverted_index.environment | 63 |
| abstract_inverted_index.healthcare, | 77 |
| abstract_inverted_index.monitoring, | 79 |
| abstract_inverted_index.sustainable | 38 |
| abstract_inverted_index.traditional | 115 |
| abstract_inverted_index.trust-based | 191 |
| abstract_inverted_index.advancements | 6 |
| abstract_inverted_index.cutting-edge | 225 |
| abstract_inverted_index.development, | 39 |
| abstract_inverted_index.fulfillness, | 30 |
| abstract_inverted_index.requirements | 234 |
| abstract_inverted_index.significant, | 18 |
| abstract_inverted_index.substantial, | 17 |
| abstract_inverted_index.technologies | 47 |
| abstract_inverted_index.(cooperation) | 217 |
| abstract_inverted_index.adaptability, | 28 |
| abstract_inverted_index.applications, | 4, 73, 109, 131 |
| abstract_inverted_index.dependability | 216 |
| abstract_inverted_index.evolvability. | 33 |
| abstract_inverted_index.manufacturing | 10 |
| abstract_inverted_index.cost-effective | 21 |
| abstract_inverted_index.energy-efficient | 19 |
| abstract_inverted_index.intercommunication | 3 |
| abstract_inverted_index.<title>Abstract</title> | 0 |
| cited_by_percentile_year | |
| countries_distinct_count | 2 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile.value | 0.15464616 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |