An Index-Based Provenance Compression Scheme for Identifying Malicious Nodes in Multihop IoT Network
暂无分享,去创建一个
[1] Marianne Winslett,et al. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance , 2009, FAST.
[2] Nei Kato,et al. A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues , 2017, IEEE Communications Surveys & Tutorials.
[3] Elisa Bertino,et al. A Lightweight Secure Provenance Scheme for Wireless Sensor Networks , 2012, 2012 IEEE 18th International Conference on Parallel and Distributed Systems.
[4] Jin-Hee Cho,et al. PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[5] Adeel Anjum,et al. Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes , 2017, J. Netw. Comput. Appl..
[6] Elisa Bertino,et al. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[7] Biplab Sikdar,et al. BlockPro: Blockchain based Data Provenance and Integrity for Secure IoT Environments , 2018, BlockSys@SenSys.
[8] Elisa Bertino,et al. Secure Provenance Transmission for Streaming Data , 2013, IEEE Transactions on Knowledge and Data Engineering.
[9] Sonia Fahmy,et al. Energy-efficient provenance transmission in large-scale wireless sensor networks , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[10] Elisa Bertino,et al. Sensor Network Provenance Compression Using Dynamic Bayesian Networks , 2017, ACM Trans. Sens. Networks.
[11] Choong Seon Hong,et al. Provenance-enabled Packet Path Tracing in the RPL-based Internet of Things , 2018, Comput. Networks.
[12] Gedare Bloom,et al. Anomaly-based Intrusion Detection of IoT Device Sensor Data using Provenance Graphs , 2018 .
[13] John A. Stankovic,et al. Research Directions for the Internet of Things , 2014, IEEE Internet of Things Journal.
[14] Choong Seon Hong,et al. Detection of Malicious Node in RPL-Based Internet of Things through Provenance , 2018 .
[15] Mrs. K. Valarmathi,et al. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks , 2016 .
[16] Elisa Bertino,et al. Secure data provenance compression using arithmetic coding in wireless sensor networks , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[17] Sabah Suhail,et al. Introducing Secure Provenance in IoT: Requirements and Challenges , 2016, 2016 International Workshop on Secure Internet of Things (SIoT).
[18] Jiafu Wan,et al. Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.
[19] Biplab Sikdar,et al. Secure Data Provenance for the Internet of Things , 2017, IoTPTS@AsiaCCS.
[20] Elisa Bertino,et al. Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.
[21] R. Ramadan,et al. IoT Data Provenance Implementation Challenges , 2017, ANT/SEIT.
[22] Changda Wang,et al. Cluster-Based Arithmetic Coding for Data Provenance Compression in Wireless Sensor Networks , 2018, Wirel. Commun. Mob. Comput..
[23] Ramesh Karri,et al. Hardware and embedded security in the context of internet of things , 2013, CyCAR '13.
[24] Elisa Bertino,et al. Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.