Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things

[1]  Ramón Alcarria,et al.  An IoT based reference architecture for smart water management processes , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[2]  H. T. Mouftah,et al.  Trustworthy crowdsourcing via mobile social networks , 2014, 2014 IEEE Global Communications Conference.

[3]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[4]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[5]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[6]  Ilsun You,et al.  ISMA: Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT , 2017, IEEE Access.

[7]  Hsing-Chung Chen,et al.  Driver behaviour detection and vehicle rating using multi-UAV coordinated vehicular networks , 2017, J. Comput. Syst. Sci..

[8]  Anna Ståhlbröst Understanding Modes of Crowdsourcing and Related Crowd Motivators , 2015 .

[9]  Prem Prakash Jayaraman,et al.  Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..

[10]  Hiroyuki Sato,et al.  Establishing Trust in the Emerging Era of IoT , 2016, 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE).

[11]  Xiaolong Yang,et al.  Crowd-Funding: A New Resource Cooperation Mode for Mobile Cloud Computing , 2016, PloS one.

[12]  Alan Marchiori,et al.  Crowdsourcing low-power wide-area IoT networks , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[13]  Jure Leskovec,et al.  Friendship and mobility: user movement in location-based social networks , 2011, KDD.

[14]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[15]  Ilsun You,et al.  Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing , 2017, IEEE Access.

[16]  Antonio Kung,et al.  A Privacy Engineering Framework for the Internet of Things , 2017 .

[17]  Wolfgang Kastner,et al.  Integrating the EPCIS and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[18]  Mohsen Guizani,et al.  Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.

[19]  Noël Crespi,et al.  Social Cloud-Based Cognitive Reasoning for Task-Oriented Recommendation , 2015, IEEE Cloud Computing.

[20]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[21]  Siu-Ming Yiu,et al.  Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..

[22]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[23]  Paulo F. Pires,et al.  System modelling and performance evaluation of a three-tier Cloud of Things , 2017, Future Gener. Comput. Syst..

[24]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[25]  Hyun-Woo Lee,et al.  Toward a Trust Evaluation Mechanism in the Social Internet of Things , 2017, Sensors.

[26]  Nirwan Ansari,et al.  EdgeIoT: Mobile Edge Computing for the Internet of Things , 2016, IEEE Communications Magazine.

[27]  Tarik Taleb,et al.  Mobile Edge Computing Potential in Making Cities Smarter , 2017, IEEE Communications Magazine.

[28]  H. T. Mouftah,et al.  Mobility-aware trustworthy crowdsourcing in cloud-centric Internet of Things , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).

[29]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[30]  Ilsun You,et al.  SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers , 2017, Mob. Inf. Syst..

[31]  Kiran Kuchi,et al.  A Feasible Cellular Internet of Things: Enabling Edge Computing and the IoT in Dense Futuristic Cellular Networks , 2017, IEEE Consumer Electronics Magazine.

[32]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[33]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[34]  Karl Andersson,et al.  Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks , 2015, J. Internet Serv. Inf. Secur..

[35]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[36]  Albert Y. Zomaya,et al.  Home Fog Server: Taking Back Control from the Cloud , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).

[37]  Mubashir Husain Rehmani,et al.  Introduction to the Special Section on Social Collaborative Internet of Things , 2017, Comput. Electr. Eng..

[38]  Santosh V. Nagaraj,et al.  Entropy-based spectrum sensing in cognitive radio , 2009, Signal Process..

[39]  Antonio Pescapè,et al.  Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..

[40]  Peter Corcoran Mobile-Edge Computing and Internet of Things for Consumers: Part II: Energy efficiency, connectivity, and economic development , 2017, IEEE Consumer Electronics Magazine.

[41]  Djamal Zeghlache,et al.  Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..

[42]  Dario Pompili,et al.  Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.

[43]  Jörg Daubert,et al.  A view on privacy & trust in IoT , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[44]  Roger L. Hughes,et al.  A continuum theory for the flow of pedestrians , 2002 .

[45]  Victor C. M. Leung,et al.  Distributed Data Flow: a Programming Model for the Crowdsourced Internet of Things , 2015, Middleware Doctoral Symposium.

[46]  Ciprian Dobre,et al.  A multi-objective optimization of data dissemination in delay tolerant networks , 2016, Expert Syst. Appl..

[47]  M. Wand,et al.  EXACT MEAN INTEGRATED SQUARED ERROR , 1992 .

[48]  Ismail Butun Privacy and trust relations in Internet of Things from the user point of view , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).

[49]  Daniel Gutiérrez-Reina,et al.  On-siteDriverID: A secure authentication scheme based on Spanish eID cards for vehicular ad hoc networks , 2016, Future Gener. Comput. Syst..

[50]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[51]  Xianbin Wang,et al.  Live Data Analytics With Collaborative Edge and Cloud Processing in Wireless IoT Networks , 2017, IEEE Access.

[52]  Surajit Ray,et al.  The topography of multivariate normal mixtures , 2005 .

[53]  Martin Maier,et al.  Mobile Edge Computing Empowered Fiber-Wireless Access Networks in the 5G Era , 2017, IEEE Communications Magazine.

[54]  Ejaz Ahmed,et al.  A survey on mobile edge computing , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).

[55]  Jin Li,et al.  Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..