Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks
暂无分享,去创建一个
Kaoru Ota | Anfeng Liu | Zhiping Cai | Tian Wang | Xiao Liu | Mianxiong Dong | Yuxin Liu | M. Dong | K. Ota | Anfeng Liu | Zhiping Cai | Tian Wang | Yuxin Liu | Xiao Liu
[1] Jun Xu,et al. Traceback in wireless sensor networks with packet marking and logging , 2011, Frontiers of Computer Science in China.
[2] Arwa Alrawais,et al. Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.
[3] Anfeng Liu,et al. A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs , 2015 .
[4] Terence D. Todd,et al. Energy Provisioning in Solar-Powered Wireless Mesh Networks , 2010, IEEE Transactions on Vehicular Technology.
[5] Zhongmin Wang,et al. Trust-based distributed Kalman filtering for target tracking under malicious cyber attacks , 2019, Inf. Fusion.
[6] Jemal H. Abawajy,et al. Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks , 2017, Future Gener. Comput. Syst..
[7] Yuan Yan Tang,et al. Defending against the Advanced Persistent Threat: An Optimal Control Approach , 2018, Secur. Commun. Networks.
[8] Xuemin Shen,et al. Energy-Efficient Power Allocation With Individual and Sum Power Constraints , 2018, IEEE Transactions on Wireless Communications.
[9] Giancarlo Fortino,et al. Modelling and simulation of Opportunistic IoT Services with Aggregate Computing , 2019, Future Gener. Comput. Syst..
[10] Jie Li,et al. Distributed duty cycle control for delay improvement in wireless sensor networks , 2017, Peer-to-Peer Netw. Appl..
[11] Ning Zhang,et al. A Secure Charging Scheme for Electric Vehicles With Smart Communities in Energy Blockchain , 2019, IEEE Internet of Things Journal.
[12] Jie Wu,et al. Community-Aware Opportunistic Routing in Mobile Social Networks , 2014, IEEE Transactions on Computers.
[13] Anfeng Liu,et al. A Trust-Based Active Detection for Cyber-Physical Security in Industrial Environments , 2019, IEEE Transactions on Industrial Informatics.
[14] Athanasios V. Vasilakos,et al. IoT-Based Big Data Storage Systems in Cloud Computing: Perspectives and Challenges , 2017, IEEE Internet of Things Journal.
[15] Jie Wu,et al. Online Task Assignment for Crowdsensing in Predictable Mobile Social Networks , 2017, IEEE Transactions on Mobile Computing.
[16] Iftekhar Ahmad,et al. Acoustic sensor networks in the Internet of Things applications , 2018, Future Gener. Comput. Syst..
[17] Anfeng Liu,et al. Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications , 2019, Peer-to-Peer Networking and Applications.
[18] Jie Wu,et al. Achieving reliable and secure services in cloud computing environments , 2017, Comput. Electr. Eng..
[19] Xiaoying Gan,et al. An Intelligence-Driven Security-Aware Defense Mechanism for Advanced Persistent Threats , 2019, IEEE Transactions on Information Forensics and Security.
[20] Jie Wu,et al. Home-Based Zero-Knowledge Multi-Copy Routing in Mobile Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[21] Saru Kumari,et al. Introduction to the special section on Big data and IoT in e-healthcare , 2018, Comput. Electr. Eng..
[22] Brijesh Kumar Rai,et al. A Joint Routing and MAC Protocol for Transmission Delay Reduction in Many-to-One Communication Paradigm for Wireless Sensor Networks , 2017, IEEE Internet of Things Journal.
[23] Kim-Kwang Raymond Choo,et al. Enhancing privacy through uniform grid and caching in location-based services , 2017, Future Gener. Comput. Syst..
[24] Laurence T. Yang,et al. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure , 2018, J. Comput. Syst. Sci..
[25] Naixue Xiong,et al. Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security , 2020, IEEE Transactions on Network Science and Engineering.
[26] Kuo-Feng Ssu,et al. Reducing Communication Delay by Finding Sink Location in Low-Duty-Cycle Wireless Sensor Networks , 2013, 2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing.
[27] Xiaohu Tang,et al. Optimal Power Allocation for Wireless Sensor Powered by Dedicated RF Energy Source , 2019, IEEE Transactions on Vehicular Technology.
[28] Abdulsalam Yassine,et al. IoT big data analytics for smart homes with fog and cloud computing , 2019, Future Gener. Comput. Syst..
[29] Xiao Liu,et al. Big program code dissemination scheme for emergency software-define wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..
[30] Anfeng Liu,et al. UAVs joint vehicles as data mules for fast codes dissemination for edge networking in Smart City , 2019, Peer-to-Peer Networking and Applications.
[31] Hongwei Li,et al. Secure Multi-Party Computation: Theory, practice and applications , 2019, Inf. Sci..
[32] Guojun Wang,et al. Detection of hidden data attacks combined fog computing and trust evaluation method in sensor‐cloud system , 2018, Concurr. Comput. Pract. Exp..
[33] Hyunsoo Yoon,et al. Secure mobile device structure for trust IoT , 2017, The Journal of Supercomputing.
[34] Zhihui Lu,et al. Bigdata logs analysis based on seq2seq networks for cognitive Internet of Things , 2019, Future Gener. Comput. Syst..
[35] Rongxing Lu,et al. Achieving Privacy-Preserving Multi Dot-Product Query in Fog Computing-Enhanced IoT , 2017, GLOBECOM 2017 - 2017 IEEE Global Communications Conference.
[36] Zhisheng Niu,et al. Recursive Waterfilling for Wireless Links With Energy Harvesting Transmitters , 2014, IEEE Transactions on Vehicular Technology.
[37] Mohamed Jamal Zemerly,et al. Securing E-Seal real time tracking system for Internet of Things , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).
[38] Anfeng Liu,et al. Content Propagation for Content-Centric Networking Systems From Location-Based Social Networks , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[39] Xuyun Zhang,et al. Secure Computing for the Internet of Things and Network Edges: Protecting Communication in the Worldwide Network of Devices , 2018, IEEE Consumer Electronics Magazine.
[40] Ming Zhao,et al. Adjusting forwarder nodes and duty cycle using packet aggregation routing for body sensor networks , 2020, Inf. Fusion.
[41] Jie Wu,et al. Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty-Cycle Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.