An Evolutionary Secure Energy Efficient Routing Protocol in Internet of Things
暂无分享,去创建一个
[1] Latha Tamilselvan,et al. Towards Maximum Resource Utilization and Optimal Task Execution for Gaming IoT Workflow in Mobile Cloud , 2017 .
[2] Qazi Mamoon Ashraf,et al. Autonomic schemes for threat mitigation in Internet of Things , 2015, J. Netw. Comput. Appl..
[3] Fan Wu,et al. A Collusion-Resistant Routing Scheme for Noncooperative Wireless Ad Hoc Networks , 2010, IEEE/ACM Transactions on Networking.
[4] Chunhua Jin,et al. Practical access control for sensor networks in the context of the Internet of Things , 2016, Comput. Commun..
[5] Chi Harold Liu,et al. Scalable Channel Allocation and Access Scheduling for Wireless Internet-of-Things , 2013, IEEE Sensors Journal.
[6] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[7] Li-Rong Zheng,et al. An Internet-of-Things solution for food safety and quality control: A pilot project in China , 2016, J. Ind. Inf. Integr..
[8] Hsiao-Hwa Chen,et al. An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.
[9] Hannu Tenhunen,et al. End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..
[10] Athanasios V. Vasilakos,et al. A knowledge-based resource discovery for Internet of Things , 2016, Knowl. Based Syst..
[11] Bin Ren,et al. The monitoring and managing application of cloud computing based on Internet of Things , 2016, Comput. Methods Programs Biomed..
[12] Feng Xia,et al. ERGID: An efficient routing protocol for emergency response Internet of Things , 2016, J. Netw. Comput. Appl..
[13] Luca Mottola,et al. Building Internet of Things software with ELIoT , 2016, Comput. Commun..
[14] Feng Xia,et al. A greedy model with small world for improving the robustness of heterogeneous Internet of Things , 2016, Comput. Networks.
[15] Carlo Fischione,et al. MAC-aware routing metrics for the internet of things , 2013, Comput. Commun..
[16] Hangyang Dai,et al. Key Predistribution Approach in Wireless Sensor Networks Using LU Matrix , 2010, IEEE Sensors Journal.
[17] Arun Agarwal,et al. The 5th Generation Mobile Wireless Networks- Key Concepts, Network Architecture and Challenges , 2015 .
[18] Nadjib Badache,et al. Event-Aware Framework for Dynamic Services Discovery and Selection in the Context of Ambient Intelligence and Internet of Things , 2016, IEEE Transactions on Automation Science and Engineering.
[19] Saraju P. Mohanty,et al. Design of a High-Performance System for Secure Image Communication in the Internet of Things , 2016, IEEE Access.
[20] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[21] Paulo F. Pires,et al. On the interplay of Internet of Things and Cloud Computing: A systematic mapping study , 2016, Comput. Commun..
[22] Carsten Bormann,et al. 6LoWPAN: The Wireless Embedded Internet , 2009 .
[23] Cristina Alcaraz,et al. Security of industrial sensor network-based remote substations in the context of the Internet of Things , 2013, Ad Hoc Networks.
[24] Cristina Alcaraz,et al. A Security Analysis for Wireless Sensor Mesh Networks in Highly Critical Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[25] Nei Kato,et al. Effective Data Collection Via Satellite-Routed Sensor System (SRSS) to Realize Global-Scaled Internet of Things , 2013, IEEE Sensors Journal.