Analysis of Visible Light Communication using Integrated Avalanche Photodiode
Volume-4 | Issue-2
A Review on Identifying Suitable Machine Learning Approach for Internet of Things Applications
Volume-3 | Issue-3
TOWARDS GHZ METALLIC ACCESS NETWORKS
Volume-1 | Issue-1
REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3
Process Control Ladder Logic Trouble Shooting Techniques Fundamentals
Volume-1 | Issue-4
TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1
COMPUTATIONAL OFFLOADING FOR PERFORMANCE IMPROVEMENT AND ENERGY SAVING IN MOBILE DEVICES
Volume-1 | Issue-4
ANALYSIS OF ROUTING PROTOCOLS IN FLYING WIRELESS NETWORKS
Volume-1 | Issue-3
Dual Edge-Fed Left Hand and Right Hand Circularly Polarized Rectangular Micro-Strip Patch Antenna for Wireless Communication Applications
Volume-2 | Issue-3
Modified Gray Wolf Feature Selection and Machine Learning Classification for Wireless Sensor Network Intrusion Detection
Volume-3 | Issue-2
TRUST BASED ROUTING ALGORITHM IN INTERNET OF THINGS (IoT)
Volume-1 | Issue-1
Hybrid Micro-Energy Harvesting Model using WSN for Self-Sustainable Wireless Mobile Charging Application
Volume-3 | Issue-3
Three Phase Coil based Optimized Wireless Charging System for Electric Vehicles
Volume-3 | Issue-3
Cyber-attack and Measuring its Risk
Volume-3 | Issue-4
REVIEW ON UBIQUITOUS CLOUDS AND PERSONAL MOBILE NETWORKS
Volume-1 | Issue-3
Analysis of Solar Power Generation Performance Improvement Techniques
Volume-4 | Issue-3
Pollination Inspired Clustering Model for Wireless Sensor Network Optimization
Volume-3 | Issue-3
Design of Low Power Cam Memory Cell for the Next Generation Network Processors
Volume-3 | Issue-4
A STUDY OF RESEARCH NOTIONS IN WIRELESS BODY SENSOR NETWORK (WBSN)
Volume-1 | Issue-2
Computation of Constant Gain and NF Circles for 60 GHz Ultra-low noise Amplifiers
Volume-3 | Issue-3
Volume - 2 | Issue - 2 | june 2020
Published
26 May, 2020
As the advancement of IoT (Internet of Things) and other emerging mobile application continues, it is an accepted fact that Edge Computing paradigm is considered to be the best fit in terms of fulfilling the resource requirements. Moreover, it is a fact that the data collected by the sensor networks serves as the base for the IoT applications as well as the systems. However, due to advancement in cybercrimes, there is a possibility that the data collected through the sensor networks are vulnerable to attacks which may result in serious consequences. The proposed work focuses on a new model which is used to gather trustworthy data using edge computing in IoT. In order to get the accurately quantified trust values, the sensor nodes are analyzed and found from different dimensions. Moreover, with the help of trust value obtained, it is possible to find the best mobility path which carries the highest value of trust. This data is gathered from the sensors with the help of mobile edge data collector. This analysis shows that for a trustworthy data collection model of IoT, there is noticeable improvement in terms of energy conservation and system security, thereby improving the performance of the system.
KeywordsInternet of Things Edge Computing Quantified trust values Sensor Nodes
Full Article PDF Download Article PDF