Case Study: A Review of Security Challenges, Attacks and Trust and Reputation Models in Wireless Sensor Networks

  • Rathore H
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

… They should be fault tolerant, should have self-healing capability and high assurance. … Self-enforcing scheme uses asymmetric cryptography such as public key certificates, Diffie-…

Cite

CITATION STYLE

APA

Rathore, H. (2016). Case Study: A Review of Security Challenges, Attacks and Trust and Reputation Models in Wireless Sensor Networks. In Mapping Biological Systems to Network Systems (pp. 117–175). Springer International Publishing. https://doi.org/10.1007/978-3-319-29782-8_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free