SASC: Secure and Authentication-Based Sensor Cloud Architecture for Intelligent Internet of Things
暂无分享,去创建一个
Ikram Ud Din | Ahmad Almogren | Ayman Altameem | Naveed Islam | Khalid Haseeb | Ahmad S. Almogren | I. Din | A. Altameem | K. Haseeb | N. Islam
[1] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[2] Mario Huemer,et al. Digitally-intensive transceivers for future mobile communications—emerging trends and challenges , 2018, Elektrotech. Informationstechnik.
[3] Younghan Kim,et al. An Efficient Interactive Model for On-Demand Sensing-As-A-Servicesof Sensor-Cloud , 2016, Sensors.
[4] Wendi Heinzelman,et al. Energy-efficient communication protocol for wireless microsensor networks , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[5] Mohsen Guizani,et al. Cloud of Things for Sensing-as-a-Service: Architecture, Algorithms, and Use Case , 2016, IEEE Internet of Things Journal.
[6] Neelam Srivastava,et al. WIRELESS SENSOR NETWORKS IN AGRICULTURE: FOR POTATO FARMING , 2010 .
[7] Xiaolei Dong,et al. Security and Privacy for Cloud-Based IoT: Challenges , 2017, IEEE Communications Magazine.
[8] Vijay H. Mankar,et al. Text Encryption Algorithms based on Pseudo Random Number Generator , 2015 .
[9] Ainuddin Wahid Abdul Wahab,et al. Energy harvesting and battery power based routing in wireless sensor networks , 2017, Wirel. Networks.
[10] Nidal Nasser,et al. Secure Multipath Routing Protocol for Wireless Sensor Networks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).
[11] Mohsen Guizani,et al. RobustTrust – A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things , 2019, IEEE Access.
[12] Byung-Seo Kim,et al. The Internet of Things: A Review of Enabled Technologies and Future Challenges , 2019, IEEE Access.
[13] Bruce Schneier,et al. Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.
[14] Song Guo,et al. Secure Multimedia Big Data in Trust-Assisted Sensor-Cloud for Smart City , 2017, IEEE Communications Magazine.
[15] Qiang Liu,et al. A Survey of Clustering With Deep Learning: From the Perspective of Network Architecture , 2018, IEEE Access.
[16] Kostas E. Psannis,et al. Secure integration of IoT and Cloud Computing , 2018, Future Gener. Comput. Syst..
[17] Khalid A. Darabkh,et al. Improved clustering algorithms for target tracking in wireless sensor networks , 2017, The Journal of Supercomputing.
[18] Mohsen Guizani,et al. Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring , 2017, IEEE Wireless Communications.
[19] Nikos A. Vlassis,et al. The global k-means clustering algorithm , 2003, Pattern Recognit..
[20] Salwani Abdullah,et al. Secure Knowledge and Cluster-Based Intrusion Detection Mechanism for Smart Wireless Sensor Networks , 2018, IEEE Access.
[21] Ahmed Serhrouchni,et al. A lightweight IoT security protocol , 2017, 2017 1st Cyber Security in Networking Conference (CSNet).
[22] Xiaohui Yuan,et al. A Genetic Algorithm-Based, Dynamic Clustering Method Towards Improved WSN Longevity , 2016, Journal of Network and Systems Management.
[23] Jin Li,et al. Privacy-preserving outsourced classification in cloud computing , 2018, Cluster Computing.
[24] Kakali Chatterjee,et al. A Secure and Efficient Authentication Protocol in Wireless Sensor Network , 2015, Wirel. Pers. Commun..
[25] Dan Tian,et al. LEACH-Based Security Routing Protocol for WSNs , 2012 .
[26] Yashwant Prasad Singh,et al. Topology-controlled adaptive clustering for uniformity and increased lifetime in wireless sensor networks , 2012, IET Wirel. Sens. Syst..
[27] Jiannong Cao,et al. QoS Aware Geographic Opportunistic Routing in Wireless Sensor Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.
[28] Ivana Tomić,et al. A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.
[29] Ahmad Ali,et al. A Comprehensive Survey on Real-Time Applications of WSN , 2017, Future Internet.
[30] Ramesh Chandra Joshi,et al. A Robust Trust Mechanism Algorithm for Secure Power Aware AODV Routing in Mobile Ad Hoc Networks , 2010, IC3.
[31] Michel Kadoch,et al. Performance Improvement of Cluster-Based Routing Protocol in VANET , 2017, IEEE Access.
[32] B. S. Sohi,et al. An Optimal Tree-Based Routing Protocol Using Particle Swarm Optimization , 2018 .
[33] Daniele Tarchi,et al. Gateway selection and clustering in multi-interface wireless mesh networks considering network reliability and traffic , 2018, Trans. Emerg. Telecommun. Technol..
[34] Gautam M. Borkar,et al. A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks , 2017, Wirel. Networks.
[35] Mahadev Satyanarayanan,et al. The Emergence of Edge Computing , 2017, Computer.
[36] Mohammed Abo-Zahhad,et al. A Comprehensive Survey on Hierarchical-Based Routing Protocols for Mobile Wireless Sensor Networks: Review, Taxonomy, and Future Directions , 2017, Wirel. Commun. Mob. Comput..
[37] Gunasekaran Manogaran,et al. Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System , 2018 .
[38] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[39] Victor C. M. Leung,et al. Social Sensor Cloud: Framework, Greenness, Issues, and Outlook , 2018, IEEE Network.
[40] Jamil Y. Khan,et al. An effective energy-harvesting-aware routing algorithm for WSN-based IoT applications , 2017, 2017 IEEE International Conference on Communications (ICC).
[41] Victor C. M. Leung,et al. Multi-Method Data Delivery for Green Sensor-Cloud , 2017, IEEE Communications Magazine.
[42] Mohsen Guizani,et al. Machine learning in the Internet of Things: Designed techniques for smart cities , 2019, Future Gener. Comput. Syst..
[43] Springer Fachmedien Wiesbaden. Constantly reliable tools , 2017 .
[44] M. Shamim Hossain,et al. A Survey on Sensor-Cloud: Architecture, Applications, and Approaches , 2013, Int. J. Distributed Sens. Networks.
[45] Byung-Seo Kim,et al. Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.
[46] Yuan-Ting Zhang,et al. A Novel Secure IoT-Based Smart Home Automation System Using a Wireless Sensor Network , 2016, Sensors.
[47] Mohsen Guizani,et al. StabTrust—A Stable and Centralized Trust-Based Clustering Mechanism for IoT Enabled Vehicular Ad-Hoc Networks , 2020, IEEE Access.
[48] Baoyu Zheng,et al. Physical-Layer Security and Reliability Challenges for Industrial Wireless Sensor Networks , 2017, IEEE Access.
[49] Nadra Guizani,et al. Secret Sharing-Based Energy-Aware and Multi-Hop Routing Protocol for IoT Based WSNs , 2019, IEEE Access.
[50] Naveed Islam,et al. An Energy-Efficient and Secure Routing Protocol for Intrusion Avoidance in IoT-Based WSN , 2019, Energies.
[51] Younghan Kim,et al. An Efficient On-Demand Latency Guaranteed Interactive Model for Sensor-Cloud , 2018, IEEE Access.
[52] Ikram Ud Din,et al. Energy-Effective Cooperative and Reliable Delivery Routing Protocols for Underwater Wireless Sensor Networks , 2019, Energies.
[53] Sherali Zeadally,et al. Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks , 2017, IEEE Access.
[54] Xin Zhou,et al. Research and implementation of RSA algorithm for encryption and decryption , 2011, Proceedings of 2011 6th International Forum on Strategic Technology.
[55] Ikram Ud Din,et al. Intrusion Prevention Framework for Secure Routing in WSN-Based Mobile Internet of Things , 2019, IEEE Access.
[56] Tae Ho Cho,et al. An Energy-Aware Routing and Filtering Node (ERF) Selection in CCEF to Extend Network Lifetime in WSN , 2017 .
[57] Mianxiong Dong,et al. Learning IoT in Edge: Deep Learning for the Internet of Things with Edge Computing , 2018, IEEE Network.
[58] Elena Simona Lohan,et al. Robustness, Security and Privacy in Location-Based Services for Future IoT: A Survey , 2017, IEEE Access.
[59] Sanjay Kumar Madria,et al. Challenges in Secure Sensor-Cloud Computing , 2011, Secure Data Management.
[60] Ting Zhang,et al. Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education , 2017, J. Netw. Comput. Appl..
[61] Mohsen Guizani,et al. HoliTrust-A Holistic Cross-Domain Trust Management Mechanism for Service-Centric Internet of Things , 2019, IEEE Access.
[62] Muhammad Faheem,et al. Energy efficient and QoS-aware routing protocol for wireless sensor network-based smart grid applications in the context of industry 4.0 , 2017, Appl. Soft Comput..
[63] George Suciu,et al. Big Data, Internet of Things and Cloud Convergence – An Architecture for Secure E-Health Applications , 2015, Journal of Medical Systems.
[64] Muhammad Khurram Khan,et al. Cross-layer design and optimization techniques in wireless multimedia sensor networks for smart cities , 2019, Comput. Sci. Inf. Syst..
[65] Mustafa Kocakulak,et al. An overview of Wireless Sensor Networks towards internet of things , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).