Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things
暂无分享,去创建一个
Dushantha Nalin K. Jayakody | Ilsun You | Mohammed Atiquzzaman | Vishal Sharma | Mohammed Atiquzzaman | I. You | D. Jayakody | Vishal Sharma
[1] Ramón Alcarria,et al. An IoT based reference architecture for smart water management processes , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[2] H. T. Mouftah,et al. Trustworthy crowdsourcing via mobile social networks , 2014, 2014 IEEE Global Communications Conference.
[3] Jia Guo,et al. Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.
[4] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[5] Jia Guo,et al. Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).
[6] Ilsun You,et al. ISMA: Intelligent Sensing Model for Anomalies Detection in Cross Platform OSNs With a Case Study on IoT , 2017, IEEE Access.
[7] Hsing-Chung Chen,et al. Driver behaviour detection and vehicle rating using multi-UAV coordinated vehicular networks , 2017, J. Comput. Syst. Sci..
[8] Anna Ståhlbröst. Understanding Modes of Crowdsourcing and Related Crowd Motivators , 2015 .
[9] Prem Prakash Jayaraman,et al. Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..
[10] Hiroyuki Sato,et al. Establishing Trust in the Emerging Era of IoT , 2016, 2016 IEEE Symposium on Service-Oriented System Engineering (SOSE).
[11] Xiaolong Yang,et al. Crowd-Funding: A New Resource Cooperation Mode for Mobile Cloud Computing , 2016, PloS one.
[12] Alan Marchiori,et al. Crowdsourcing low-power wide-area IoT networks , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[13] Jure Leskovec,et al. Friendship and mobility: user movement in location-based social networks , 2011, KDD.
[14] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[15] Ilsun You,et al. Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing , 2017, IEEE Access.
[16] Antonio Kung,et al. A Privacy Engineering Framework for the Internet of Things , 2017 .
[17] Wolfgang Kastner,et al. Integrating the EPCIS and Building Automation System into the Internet of Things: a Lightweight and Interoperable Approach , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..
[18] Mohsen Guizani,et al. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.
[19] Noël Crespi,et al. Social Cloud-Based Cognitive Reasoning for Task-Oriented Recommendation , 2015, IEEE Cloud Computing.
[20] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[21] Siu-Ming Yiu,et al. Multi-key privacy-preserving deep learning in cloud computing , 2017, Future Gener. Comput. Syst..
[22] Xiaohui Liang,et al. Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.
[23] Paulo F. Pires,et al. System modelling and performance evaluation of a three-tier Cloud of Things , 2017, Future Gener. Comput. Syst..
[24] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[25] Hyun-Woo Lee,et al. Toward a Trust Evaluation Mechanism in the Social Internet of Things , 2017, Sensors.
[26] Nirwan Ansari,et al. EdgeIoT: Mobile Edge Computing for the Internet of Things , 2016, IEEE Communications Magazine.
[27] Tarik Taleb,et al. Mobile Edge Computing Potential in Making Cities Smarter , 2017, IEEE Communications Magazine.
[28] H. T. Mouftah,et al. Mobility-aware trustworthy crowdsourcing in cloud-centric Internet of Things , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).
[29] Jia Guo,et al. Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.
[30] Ilsun You,et al. SACA: Self-Aware Communication Architecture for IoT Using Mobile Fog Servers , 2017, Mob. Inf. Syst..
[31] Kiran Kuchi,et al. A Feasible Cellular Internet of Things: Enabling Edge Computing and the IoT in Dense Futuristic Cellular Networks , 2017, IEEE Consumer Electronics Magazine.
[32] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[33] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[34] Karl Andersson,et al. Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks , 2015, J. Internet Serv. Inf. Secur..
[35] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[36] Albert Y. Zomaya,et al. Home Fog Server: Taking Back Control from the Cloud , 2016, 2016 IEEE Globecom Workshops (GC Wkshps).
[37] Mubashir Husain Rehmani,et al. Introduction to the Special Section on Social Collaborative Internet of Things , 2017, Comput. Electr. Eng..
[38] Santosh V. Nagaraj,et al. Entropy-based spectrum sensing in cognitive radio , 2009, Signal Process..
[39] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[40] Peter Corcoran. Mobile-Edge Computing and Internet of Things for Consumers: Part II: Energy efficiency, connectivity, and economic development , 2017, IEEE Consumer Electronics Magazine.
[41] Djamal Zeghlache,et al. Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..
[42] Dario Pompili,et al. Collaborative Mobile Edge Computing in 5G Networks: New Paradigms, Scenarios, and Challenges , 2016, IEEE Communications Magazine.
[43] Jörg Daubert,et al. A view on privacy & trust in IoT , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[44] Roger L. Hughes,et al. A continuum theory for the flow of pedestrians , 2002 .
[45] Victor C. M. Leung,et al. Distributed Data Flow: a Programming Model for the Crowdsourced Internet of Things , 2015, Middleware Doctoral Symposium.
[46] Ciprian Dobre,et al. A multi-objective optimization of data dissemination in delay tolerant networks , 2016, Expert Syst. Appl..
[47] M. Wand,et al. EXACT MEAN INTEGRATED SQUARED ERROR , 1992 .
[48] Ismail Butun. Privacy and trust relations in Internet of Things from the user point of view , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).
[49] Daniel Gutiérrez-Reina,et al. On-siteDriverID: A secure authentication scheme based on Spanish eID cards for vehicular ad hoc networks , 2016, Future Gener. Comput. Syst..
[50] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[51] Xianbin Wang,et al. Live Data Analytics With Collaborative Edge and Cloud Processing in Wireless IoT Networks , 2017, IEEE Access.
[52] Surajit Ray,et al. The topography of multivariate normal mixtures , 2005 .
[53] Martin Maier,et al. Mobile Edge Computing Empowered Fiber-Wireless Access Networks in the 5G Era , 2017, IEEE Communications Magazine.
[54] Ejaz Ahmed,et al. A survey on mobile edge computing , 2016, 2016 10th International Conference on Intelligent Systems and Control (ISCO).
[55] Jin Li,et al. Insight of the protection for data security under selective opening attacks , 2017, Inf. Sci..