ProTru: a provenance‐based trust architecture for wireless sensor networks
暂无分享,去创建一个
[1] Suat Ozdemir,et al. Functional reputation based reliable data aggregation and transmission for wireless sensor networks , 2008 .
[2] Amit P. Sheth,et al. Linked sensor data , 2010, 2010 International Symposium on Collaborative Technologies and Systems.
[3] Yang-Sae Moon,et al. Assessing the Trustworthiness of Streaming Data , 2010 .
[4] N. Pissinou,et al. A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.
[5] Eli Herscovitz,et al. Secure virtual private networks: the future of data communications , 1999, Int. J. Netw. Manag..
[6] Elisa Bertino,et al. Research issues in data provenance for streaming environments , 2009, SPRINGL '09.
[7] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[8] John S. Heidemann,et al. Provenance in Sensornet Republishing , 2008, IPAW.
[9] Daniel Crawl,et al. Workflows and extensions to the Kepler scientific workflow system to support environmental sensor data access and analysis , 2010, Ecol. Informatics.
[10] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[11] S. Challa,et al. RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks , 2007, 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information.
[12] Hyunsoo Yoon,et al. Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..
[13] Elisa Bertino,et al. Trust Evaluation of Data Provenance , 2008 .
[14] M. Welsh,et al. Vital Signs Monitoring and Patient Tracking Over a Wireless Network , 2005, 2005 IEEE Engineering in Medicine and Biology 27th Annual Conference.
[15] Jochen Mundinger,et al. Reputation in self-organized communication systems and beyond , 2006 .
[16] Yu-Kwong Kwok,et al. A Trust-Based Geographical Routing Scheme in Sensor Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[17] Saad Haj Bakry. Development of security policies for private networks , 2003 .
[18] Edward A. Lee,et al. Real-Time Distributed Discrete-Event Execution with Fault Tolerance , 2008, 2008 IEEE Real-Time and Embedded Technology and Applications Symposium.
[19] Saad Haj Bakry,et al. Development of security policies for private networks , 2003, Int. J. Netw. Manag..
[20] Chaki Ng,et al. Provenance-Aware Sensor Data Storage , 2005, 21st International Conference on Data Engineering Workshops (ICDEW'05).
[21] R. Govindan,et al. A PROGRAMMABLE WIRELESS SENSING SYSTEM FOR STRUCTURAL MONITORING , 2022 .
[22] Amit P. Sheth,et al. Provenance Aware Linked Sensor Data , 2010 .
[23] Wang-Chien Lee,et al. Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access , 2007 .
[24] Niki Pissinou,et al. Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[25] Eric G. Stephan,et al. Leveraging the Open Provenance Model as a Multi-tier Model for Global Climate Research , 2010, IPAW.
[26] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[27] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[28] Yacine Rebahi,et al. A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[29] Matt Welsh,et al. Deploying a wireless sensor network on an active volcano , 2006, IEEE Internet Computing.
[30] Deborah Estrin,et al. Guest Editors' Introduction: Overview of Sensor Networks , 2004, Computer.
[31] Jie Wu,et al. A Novel CDS-Based Reputation Monitoring System for Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.
[32] Saurabh Bagchi,et al. TIBFIT: trust index based fault tolerance for arbitrary data faults in sensor networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[33] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[34] Margo I. Seltzer,et al. Provenance: a future history , 2009, OOPSLA Companion.
[35] Qing Zhang,et al. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.
[36] Omer F. Rana,et al. Evaluating Provenance-based Trust for Scientific Workflows , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).
[37] Yoonmee Doh,et al. PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[38] Steven D. Glaser,et al. Some real-world applications of wireless sensor nodes , 2004, SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring.
[39] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[40] Norman L. Chervany,et al. Conceptualizing trust: a typology and e-commerce customer relationships model , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[41] Subhash Challa,et al. Survey of trust models in different network domains , 2010, ArXiv.
[42] B SrivastavaMani,et al. Reputation-based framework for high integrity sensor networks , 2008 .
[43] Wang-Chien Lee,et al. Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.
[44] Robert C. Bolles,et al. Random sample consensus: a paradigm for model fitting with applications to image analysis and automated cartography , 1981, CACM.
[45] Sungyoung Lee,et al. Trust Management Problem in Distributed Wireless Sensor Networks , 2006, 12th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA'06).
[46] Elisa Bertino,et al. Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.
[47] Junguo Zhang,et al. Forest fire detection system based on a ZigBee wireless sensor network , 2008 .
[48] Huafeng Wu,et al. Reputation-based Trust in Wireless Sensor Networks , 2007, 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07).
[49] Liudong Xing,et al. Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[50] Ping Ji,et al. Tiered architecture for on-line detection, isolation and repair of faults in wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[51] Tarek F. Abdelzaher,et al. SNTS: Sensor Network Troubleshooting Suite , 2007, DCOSS.
[52] Daniel Crawl,et al. A Provenance-Based Fault Tolerance Mechanism for Scientific Workflows , 2008, IPAW.
[53] Rodrigo Roman,et al. A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[54] Kiyoung Kim,et al. A security framework with trust management for sensor networks , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..
[55] Johnson I. Agbinya,et al. A New Algorithm of Trust Formation in Wireless Sensor Networks , 2007 .
[56] Matt Welsh,et al. Monitoring volcanic eruptions with a wireless sensor network , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..
[57] Jiawei Han,et al. Finding Symbolic Bug Patterns in Sensor Networks , 2009, DCOSS.
[58] Mani Srivastava,et al. Overview of sensor networks , 2004 .