A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
Uloženo v:
| Vydáno v: | EURASIP Journal on Wireless Communications and Networking Ročník 2023 |
|---|---|
| Hlavní autoři: | , , , , , , |
| Médium: | Journal Article |
| Jazyk: | japonština |
| Vydáno: |
Springer Science and Business Media LLC
05.03.2023
|
| Témata: | |
| ISSN: | 1687-1499 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Author | Tao Jiang Xiucai Ye Mengke Tian Zhengyu Wu Junwei Yan Liwei Lin Yong Wang |
|---|---|
| Author_xml | – sequence: 1 fullname: Junwei Yan – sequence: 2 fullname: Tao Jiang – sequence: 3 fullname: Liwei Lin – sequence: 4 fullname: Zhengyu Wu – sequence: 5 fullname: Xiucai Ye – sequence: 6 fullname: Mengke Tian – sequence: 7 fullname: Yong Wang |
| BackLink | https://cir.nii.ac.jp/crid/1870865117615086208$$DView record in CiNii |
| BookMark | eNotTk1LxDAQDaLg7uof8JSD12om0-bjuCzqLix4sOBRknS6Zm0TsVHw31vRw_vgzfB4S3aaciLGrkDcABh1OwEqNJWQOEMiVuaELUAZXUFt7TlbTtNRCMTaygV7XvOUv2jgT98-DtyV4sIb76hQKDEnPoVXGonHxMc8PxDf5ZZ7N1HH52vIw-B8_nCFOHUHmoPx_bPEdLhgZ70bJrr81xVr7-_azbbaPz7sNut9dbSNqZxodC9Dp-dh0qPSPQhvyFglhFWEXgZfo6-D96E3SKGWxuvOyr6xPQTAFbv-q00xvoT4y2C0MKoB0Aqa2Ulh8Af_cVGA |
| ContentType | Journal Article |
| DBID | RYH |
| DOI | 10.1186/s13638-023-02233-8 10.60692/hjrj6-tby65 10.60692/dy7zg-t8h52 |
| DatabaseName | CiNii Complete |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Mathematics Computer Science |
| EISSN | 1687-1499 |
| GroupedDBID | .4S .DC 0R~ 29G 2WC 4.4 40G 5GY 5VS 6OB 8FE 8FG 8R4 8R5 AAFWJ AAJSJ AAKKN AAKPC AASML ABDBF ABEEZ ABFTD ABUWG ACACY ACGFS ACUHS ACULB ADBBV ADDVE ADMLS AENEX AFGXO AFKRA AFPKN AHBYD AHYZX ALMA_UNASSIGNED_HOLDINGS AMKLP ARAPS ARCSS AZQEC BCNDV BENPR BGLVJ BPHCQ C24 C6C CS3 DU5 DWQXO E3Z EAD EAP EAS EBLON EBS EDO EMK ESX GNUQQ GROUPED_DOAJ HCIFZ HZ~ I-F K6V K7- KQ8 OK1 OVT P2P P62 PIMPY PQQKQ PROAC Q2X RHU RNS RYH SEG SOJ TUS U2A XSB |
| ID | FETCH-LOGICAL-j958-a057f2cd74992b367f10b8e8960096e3b2cb43b4cbbcf83ec428b7d92f59f1c13 |
| IngestDate | Mon Nov 10 09:15:50 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Language | Japanese |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-j958-a057f2cd74992b367f10b8e8960096e3b2cb43b4cbbcf83ec428b7d92f59f1c13 |
| OpenAccessLink | http://dx.doi.org/10.1186/s13638-023-02233-8 |
| ParticipantIDs | nii_cinii_1870865117615086208 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-03-05 |
| PublicationDateYYYYMMDD | 2023-03-05 |
| PublicationDate_xml | – month: 03 year: 2023 text: 2023-03-05 day: 05 |
| PublicationDecade | 2020 |
| PublicationTitle | EURASIP Journal on Wireless Communications and Networking |
| PublicationYear | 2023 |
| Publisher | Springer Science and Business Media LLC |
| Publisher_xml | – name: Springer Science and Business Media LLC |
| SSID | ssj0033492 ssib004908193 |
| Score | 2.332474 |
| SourceID | nii |
| SourceType | Publisher |
| SubjectTerms | Attack Detection Characterization and Detection of Android Malware Combinatorics Computer network Computer Networks and Communications Computer science Computer security Detection Edge Computing Electronics Engineering Enhanced Data Rates for GSM Evolution FOS: Mathematics Internet of Things Interval (graph theory) Intrusion Detection IoT Security Mathematical analysis Mathematics Mobile IoT Network Intrusion Detection and Defense Mechanisms Node (physics) Physical Sciences Scheme (mathematics) Secure Routing Security in Wireless Sensor Networks Signal Processing Structural engineering Sybil attack Telecommunication Telecommunications TK5101-6720 TK7800-8360 Wireless sensor network |
| Title | A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing |
| URI | https://cir.nii.ac.jp/crid/1870865117615086208 |
| Volume | 2023 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals databaseCode: DOA dateStart: 20040101 customDbUrl: isFulltext: true eissn: 1687-1499 dateEnd: 99991231 titleUrlDefault: https://www.doaj.org/ omitProxy: false ssIdentifier: ssj0033492 providerName: Directory of Open Access Journals – providerCode: PRVAVX databaseName: SpringerOpen databaseCode: C24 dateStart: 20041201 customDbUrl: isFulltext: true eissn: 1687-1499 dateEnd: 99991231 titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 omitProxy: false ssIdentifier: ssj0033492 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Jj9MwFLaqgQMcWAYQ2yAfuEXRJHaTOMcKgRhUqpGmYgYuyGubTidBbVKm_CP-Jc9Os6CCgAMXK3GeHCvv07O_-C0IvYy5VKECDSSKEn9oAuWnsLD7TAFlIVwa6pLpfBgnkwm7uEhPB4PvTSzMZpnkObu-Tr_8V1VDHyjbhs7-g7rbQaEDrkHp0ILaof0rxY-8vNjopXe2FdnS42XJ5aWndKnrouDAZvWVyxRyVYCA9k6KqWfXMmXPDTpY2KSuM-1czquyWd8697_R2cmp1-5mc-dFu7RW86eIkzoB9KR2NW8Gsf46Vf5VZ97HDppTXnjvAKqtyDizEuOslfg01_lsW3nnVf9PBaHOVSva-1PZWi07g9a9355L8bZSsq6tcQwWEChc2jfXduRf2353FLUOKZgU370etj7U6X1PGGhbajPPzherReyXYlsXrPidmNom32Z-yeYRrPY3SBKlaY-9N_5iYReSS23SxyZGi8XH-7OqgzDcC457w_e7e5ODnU-eZb2dz_QeurNTMh7VULuPBgt-iO425UDw7jsfotu93JZw975NCLx-gM5H2KESO1TiGpW4RSWuUYmzHNeoxIBK7FCJ4WkPldiiEreofIimb15PX731dzU9_EUaMZ8DPTBEqgSUSgSNExMGgmkGPBq4tKaCSDGkYiiFkIZRLYEdi0SlxESpCWVIH6GDvMj1Y4SHLOYRNQGXQImJYcLutBihxijDSRA_QUfwyT7LzLYhLEssBnKRuAIIMQnY0z88f4ZudSB-jg7KVaWP0E25KbP16oXT_g-X6YJt |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+novel+Sybil+attack+detection+scheme+in+mobile+IoT+based+on+collaborate+edge+computing&rft.jtitle=EURASIP+Journal+on+Wireless+Communications+and+Networking&rft.au=Junwei+Yan&rft.au=Tao+Jiang&rft.au=Liwei+Lin&rft.au=Zhengyu+Wu&rft.date=2023-03-05&rft.pub=Springer+Science+and+Business+Media+LLC&rft.eissn=1687-1499&rft.volume=2023&rft_id=info:doi/10.1186%2Fs13638-023-02233-8&rft_id=info:doi/10.60692%2Fhjrj6-tby65&rft_id=info:doi/10.60692%2Fdy7zg-t8h52 |