A multi-level study of information trust models in WSN-assisted IoT
暂无分享,去创建一个
[1] Choong Seon Hong,et al. Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.
[2] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[3] Athanasios V. Vasilakos,et al. Hierarchical Data Aggregation Using Compressive Sensing (HDACS) in WSNs , 2015, ACM Trans. Sens. Networks.
[4] Quanyuan Feng,et al. RFID technology and its applications in Internet of Things (IoT) , 2012, 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet).
[5] Amit Kumar Mishra,et al. ANALYSIS OF DENIAL OF SERVICE (DOS) ATTACKS IN WIRELESS SENSOR NETWORKS , 2014 .
[6] Huafeng Wu,et al. Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[7] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[8] Luigi Atzori,et al. Trustworthiness management in the IoT: The importance of the feedback , 2017, 2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN).
[9] B. R. Badrinath,et al. Context-Aware Sensors , 2004, EWSN.
[10] Xiang Zhou,et al. A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.
[11] Audun Jøsang,et al. Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[12] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[13] Suat Özdemir,et al. Security in internet of things: A survey , 2017, 2017 International Symposium on Networks, Computers and Communications (ISNCC).
[14] Sajal K. Das,et al. A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks , 2012, IEEE Transactions on Dependable and Secure Computing.
[15] R. M. Chandrasekaran,et al. A Novel Heuristic Approach Based Trust Worthy Architecture for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..
[16] Magdy Bayoumi,et al. Data Fusion in WSN , 2012 .
[17] Zibin Zheng,et al. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems , 2015, IEEE Transactions on Services Computing.
[18] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[19] Ioannis Lambadaris,et al. MeFoRE: QoE based resource estimation at Fog to enhance QoS in IoT , 2016, 2016 23rd International Conference on Telecommunications (ICT).
[20] N. Pissinou,et al. A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.
[21] Aamir Saeed Malik,et al. Trust management system in wireless sensor networks: design considerations and research challenges , 2015, Trans. Emerg. Telecommun. Technol..
[22] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[23] Daniele Miorandi,et al. A security-and quality-aware system architecture for Internet of Things , 2014, Information Systems Frontiers.
[24] Yun Liu,et al. An Energy-Efficient Reliable Trust-Based Data Aggregation Protocol for Wireless Sensor Networks , 2015 .
[25] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[26] Ian F. Akyildiz,et al. Wireless sensor networks , 2007 .
[27] Florence Sèdes,et al. Trust Management in Social Internet of Things: A Survey , 2016, I3E.
[28] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[29] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[30] Frederik Hermans,et al. Quality estimation based data fusion in wireless sensor networks , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[31] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[32] Ricardo Neisse,et al. DIAT: A Scalable Distributed Architecture for IoT , 2015, IEEE Internet of Things Journal.
[33] Wolfgang Lehner,et al. Representing Data Quality in Sensor Data Streaming Environments , 2009, JDIQ.
[34] Shao Kun,et al. Normal Distribution Based Dynamical Recommendation Trust Model , 2012 .
[35] Yun Liu,et al. Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks , 2015, Sensors.
[36] Gang Qu,et al. Insider Threats against Trust Mechanism with Watchdog and Defending Approaches in Wireless Sensor Networks , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[37] Yun Liu,et al. Improved Reliable Trust-Based and Energy-Efficient Data Aggregation for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[38] V. Uma Rani,et al. Review of Trust Models in Wireless Sensor Networks , 2014 .
[39] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[40] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[41] Philip S. Yu,et al. A General Survey of Privacy-Preserving Data Mining Models and Algorithms , 2008, Privacy-Preserving Data Mining.
[42] Hossam S. Hassanein,et al. Vehicle as a resource (VaaR) , 2014, IEEE Network.
[43] A Meena Kowshalya,et al. Dynamic trust management for secure communications in social internet of things (SIoT) , 2018, Sādhanā.
[44] Schahram Dustdar,et al. On the Evaluation of Quality of Context , 2008, EuroSSC.
[45] Panagiotis Papadimitratos,et al. On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[46] Weisong Shi,et al. Consistency-driven data quality management of networked sensor systems , 2008, J. Parallel Distributed Comput..
[47] Fabio A. Schreiber,et al. Quality- and energy-aware data compression by aggregation in WSN data streams , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[48] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[49] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[50] Ashraf M. Aziz. A new adaptive decentralized soft decision combining rule for distributed sensor systems with data fusion , 2014, Inf. Sci..
[51] C. Chandrasekar,et al. Power Efficient Data Fusion Assurance Scheme for Sensor Network Using Silent Negative Voting , 2010 .
[52] Jia Guo,et al. Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.
[53] Qian Tao,et al. A novel prediction approach for trustworthy QoS of web services , 2012, Expert Syst. Appl..
[54] Tharam S. Dillon,et al. The Fuzzy and Dynamic Nature of Trust , 2005, TrustBus.
[55] Sundaravalli Narayanaswami,et al. Mobile adhoc networks: A simulation based security evaluation and intrusion prevention , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[56] Felix C. Freiling,et al. Cooperative Intrusion Detection in Wireless Sensor Networks , 2009, EWSN.
[57] Xiaojiang Du,et al. Defending Malicious Collision Attacks in Wireless Sensor Networks , 2010, 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[58] Chris J. Mitchell,et al. Security Vulnerabilities in Ad Hoc Networks , 2003 .
[59] Oumaima Ben Abderrahim,et al. TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[60] Yudhvir Singh,et al. Comprehensive Study of Selective Forwarding Attack in Wireless Sensor Networks , 2017 .
[61] Fakhri Karray,et al. Multisensor data fusion: A review of the state-of-the-art , 2013, Inf. Fusion.
[62] Athanasios V. Vasilakos,et al. Algorithm design for data communications in duty-cycled wireless sensor networks: A survey , 2013, IEEE Communications Magazine.
[63] Raffaele Cerulli,et al. Exact and heuristic methods to maximize network lifetime in wireless sensor networks with adjustable sensing ranges , 2012, Eur. J. Oper. Res..
[64] Antonio Casimiro,et al. A Survey on Data Quality for Dependable Monitoring in Wireless Sensor Networks , 2017, Sensors.
[65] Farookh Khadeer Hussain,et al. Clustering-Driven Intelligent Trust Management Methodology for the Internet of Things (CITM-IoT) , 2018, Mobile Networks and Applications.
[66] Eduardo F. Nakamura,et al. Information fusion for wireless sensor networks: Methods, models, and classifications , 2007, CSUR.
[67] Seyed Alireza Hashemi Golpaygani,et al. Collusion detection in feedback-based reputation systems via temporal and social analysis , 2015, 2015 International Congress on Technology, Communication and Knowledge (ICTCK).
[68] Hicham Lakhlef,et al. Internet of things security: A top-down survey , 2018, Comput. Networks.
[69] C. Cicconetti,et al. A distributed architecture for discovery and access in the internet of things , 2013, 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[70] Lei Zhang,et al. Wireless Sensor Networks and the Internet of Things , 2013, Int. J. Distributed Sens. Networks.
[71] Yan Lindsay Sun,et al. Trust Management for Defending On-Off Attacks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[72] Xi Zhang,et al. Defending collaborative false data injection attacks in wireless sensor networks , 2014, Inf. Sci..
[73] Naveen K. Chilamkurti,et al. A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks , 2015, Inf. Sci..
[74] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[75] Vladimir Zadorozhny,et al. Data Credence in IoT: Vision and Challenges , 2017, Open J. Internet Things.
[76] Harsh Kupwade Patil,et al. Wireless Sensor Network Security: The Internet of Things , 2017 .
[77] Mubashir Husain Rehmani,et al. Applications of wireless sensor networks for urban areas: A survey , 2016, J. Netw. Comput. Appl..
[78] Mari Carmen Domingo,et al. An overview of the Internet of Things for people with disabilities , 2012, J. Netw. Comput. Appl..
[79] Sajal K. Das,et al. Data Fusion with Desired Reliability in Wireless Sensor Networks , 2011, IEEE Transactions on Parallel and Distributed Systems.
[80] Yaqiong Liu,et al. An Improved Intrusion Detection Scheme Based on Weighted Trust Evaluation for Wireless Sensor Networks , 2010, 2010 Proceedings of the 5th International Conference on Ubiquitous Information Technologies and Applications.
[81] Noël Crespi,et al. Quality of Information as an indicator of Trust in the Internet of Things , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[82] Elisa Bertino,et al. Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.
[83] Hajar Mousannif,et al. Data quality in internet of things: A state-of-the-art survey , 2016, J. Netw. Comput. Appl..
[84] Sudip Misra,et al. Assessment of the Suitability of Fog Computing in the Context of Internet of Things , 2018, IEEE Transactions on Cloud Computing.
[85] Lei Huang,et al. Behavior-Based Trust in Wireless Sensor Network , 2006, APWeb Workshops.
[86] Minho Shin,et al. Challenges in Data Quality Assurance in Pervasive Health Monitoring Systems , 2009 .
[87] Luis Rodero-Merino,et al. Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing , 2014, CCRV.
[88] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[89] Xianzhi Wang,et al. Trust architecture and reputation evaluation for internet of things , 2018, J. Ambient Intell. Humaniz. Comput..
[90] Hervé Guyennet,et al. Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey , 2010, 2010 13th International Conference on Network-Based Information Systems.
[91] Zhou Su,et al. Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.
[92] Abdul Hanan Abdullah,et al. Security Issues and Attacks in Wireless Sensor Network , 2014 .
[93] Yunghsiang Sam Han,et al. A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[94] Mohsen Guizani,et al. An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[95] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[96] Nima Jafari Navimipour,et al. Data aggregation mechanisms in the Internet of things: A systematic review of the literature and recommendations for future research , 2017, J. Netw. Comput. Appl..
[97] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[98] Jordán Pascual Espada,et al. New Advances in the Internet of Things , 2018 .
[99] Stefanos Gritzalis,et al. Hybrid trust and reputation management for sensor networks , 2010, Wirel. Networks.
[100] Marko Hölbl,et al. A novel user authentication and key agreement scheme for heterogeneous ad hoc wireless sensor networks, based on the Internet of Things notion , 2014, Ad Hoc Networks.
[101] G. Evensen,et al. Analysis Scheme in the Ensemble Kalman Filter , 1998 .
[102] Noël Crespi,et al. The Cluster Between Internet of Things and Social Networks: Review and Research Challenges , 2014, IEEE Internet of Things Journal.
[103] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[104] Wei Zhang,et al. A Trust Based Framework for Secure Data Aggregation in Wireless Sensor Networks , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.
[105] S. Ozdemir,et al. Functional Reputation Based Data Aggregation for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.
[106] S. Buchegger,et al. A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .
[107] Jörg Daubert,et al. A view on privacy & trust in IoT , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[108] Yunghsiang Sam Han,et al. Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks , 2008, IEEE Transactions on Computers.
[109] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[110] Meejeong Lee,et al. A Multi-Hop Clustering Mechanism for Scalable IoT Networks , 2018, Sensors.
[111] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[112] Manoj Misra,et al. Categorising Context and Using Short Term Contextual Information to Obtain Long Term Context , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[113] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..