Security in IoT mesh networks based on trust similarity. Kavitha, A., Reddy, V. B., Singh, N., Gunjan, V. K., Lakshmanna, K., Khan, A. A., & Wechtaisong, C. IEEE Access, 10:121712–121724, IEEE, 2022. bibtex @article{kavitha2022security,
title={Security in IoT mesh networks based on trust similarity},
author={Kavitha, Athota and Reddy, Vijender Busi and Singh, Ninni and Gunjan, Vinit Kumar and Lakshmanna, Kuruva and Khan, Arfat Ahmad and Wechtaisong, Chitapong},
journal={IEEE Access},
volume={10},
pages={121712--121724},
year={2022},
publisher={IEEE}
}
Downloads: 0
{"_id":"h2xpq2gSQKiRNhK3e","bibbaseid":"kavitha-reddy-singh-gunjan-lakshmanna-khan-wechtaisong-securityiniotmeshnetworksbasedontrustsimilarity-2022","author_short":["Kavitha, A.","Reddy, V. B.","Singh, N.","Gunjan, V. K.","Lakshmanna, K.","Khan, A. A.","Wechtaisong, C."],"bibdata":{"bibtype":"article","type":"article","title":"Security in IoT mesh networks based on trust similarity","author":[{"propositions":[],"lastnames":["Kavitha"],"firstnames":["Athota"],"suffixes":[]},{"propositions":[],"lastnames":["Reddy"],"firstnames":["Vijender","Busi"],"suffixes":[]},{"propositions":[],"lastnames":["Singh"],"firstnames":["Ninni"],"suffixes":[]},{"propositions":[],"lastnames":["Gunjan"],"firstnames":["Vinit","Kumar"],"suffixes":[]},{"propositions":[],"lastnames":["Lakshmanna"],"firstnames":["Kuruva"],"suffixes":[]},{"propositions":[],"lastnames":["Khan"],"firstnames":["Arfat","Ahmad"],"suffixes":[]},{"propositions":[],"lastnames":["Wechtaisong"],"firstnames":["Chitapong"],"suffixes":[]}],"journal":"IEEE Access","volume":"10","pages":"121712–121724","year":"2022","publisher":"IEEE","bibtex":"@article{kavitha2022security,\n title={Security in IoT mesh networks based on trust similarity},\n author={Kavitha, Athota and Reddy, Vijender Busi and Singh, Ninni and Gunjan, Vinit Kumar and Lakshmanna, Kuruva and Khan, Arfat Ahmad and Wechtaisong, Chitapong},\n journal={IEEE Access},\n volume={10},\n pages={121712--121724},\n year={2022},\n publisher={IEEE}\n}\n\n","author_short":["Kavitha, A.","Reddy, V. B.","Singh, N.","Gunjan, V. K.","Lakshmanna, K.","Khan, A. A.","Wechtaisong, C."],"key":"kavitha2022security","id":"kavitha2022security","bibbaseid":"kavitha-reddy-singh-gunjan-lakshmanna-khan-wechtaisong-securityiniotmeshnetworksbasedontrustsimilarity-2022","role":"author","urls":{},"metadata":{"authorlinks":{}},"html":""},"bibtype":"article","biburl":"https://bibbase.org/f/HnQC7A6C8WxhqExKR/TCE_Chtiapong_Wechtaisong.bib","dataSources":["6PnuqZxqnSgRXnoYR"],"keywords":[],"search_terms":["security","iot","mesh","networks","based","trust","similarity","kavitha","reddy","singh","gunjan","lakshmanna","khan","wechtaisong"],"title":"Security in IoT mesh networks based on trust similarity","year":2022}