Detection of hidden data attacks combined fog computing and trust evaluation method in sensor‐cloud system
暂无分享,去创建一个
Guojun Wang | Guangxue Zhang | Weijia Jia | Tian Wang | Anfeng Liu | W. Jia | Anfeng Liu | Guangxue Zhang | Guojun Wang | Tian Wang
[1] Hui Tian,et al. Data collection from WSNs to the cloud based on mobile Fog elements , 2017, Future Gener. Comput. Syst..
[2] Hongjie Li,et al. A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud , 2015, Appl. Soft Comput..
[3] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[4] Fei Yuan,et al. Data Density Correlation Degree Clustering Method for Data Aggregation in WSN , 2014, IEEE Sensors Journal.
[5] Christine Julien,et al. Efficient and Scalable Runtime Monitoring for Cyber–Physical System , 2018, IEEE Systems Journal.
[6] Jie Wu,et al. Dependable Structural Health Monitoring Using Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[7] ShiNing Li,et al. Sensor-cloud data acquisition based on fog computation and adaptive block compressed sensing , 2018, Int. J. Distributed Sens. Networks.
[8] V Ram Prabha,et al. Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks , 2017 .
[9] Md Zakirul Alam Bhuiyan,et al. Fog-Based Computing and Storage Offloading for Data Synchronization in IoT , 2019, IEEE Internet of Things Journal.
[10] Madoka Yuriyama,et al. Sensor-Cloud Infrastructure - Physical Sensor Management with Virtualized Sensors on Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.
[11] Mohammad S. Obaidat,et al. On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network , 2017, IEEE Systems Journal.
[12] Anfeng Liu,et al. Fog-based storage technology to fight with cyber threat , 2018, Future Gener. Comput. Syst..
[13] Naixue Xiong,et al. Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security , 2020, IEEE Transactions on Network Science and Engineering.
[14] Elisa Bertino,et al. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[15] Mohsen Guizani,et al. An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[16] Chuanlei Zhang,et al. BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks , 2016, J. Netw. Comput. Appl..
[17] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[18] Abdelhak Mourad Guéroui,et al. A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks , 2016, Wirel. Pers. Commun..
[19] Donghui Li,et al. A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs , 2018, IEEE Access.
[20] Junping Du,et al. LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.
[21] Jiang Zhu,et al. Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.
[22] Rajkumar Buyya,et al. Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.
[23] Jie Wu,et al. Big Data Reduction for a Smart City’s Critical Infrastructural Health Monitoring , 2018, IEEE Communications Magazine.
[24] Zhetao Li,et al. Minimizing Convergecast Time and Energy Consumption in Green Internet of Things , 2020, IEEE Transactions on Emerging Topics in Computing.
[25] Emil C. Lupu,et al. Detecting Malicious Data Injections in Wireless Sensor Networks , 2015, ACM Comput. Surv..
[26] Athanasios V. Vasilakos,et al. A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[27] Athanasios V. Vasilakos,et al. Fog Computing for Sustainable Smart Cities , 2017, ArXiv.
[28] Weijia Jia,et al. A novel trust mechanism based on Fog Computing in Sensor-Cloud System , 2020, Future Gener. Comput. Syst..
[29] Lynne E. Parker,et al. Nearest neighbor imputation using spatial-temporal correlations in wireless sensor networks , 2014, Inf. Fusion.
[30] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[31] Muhammad Arif,et al. High-accuracy localization for indoor group users based on extended Kalman filter , 2018, Int. J. Distributed Sens. Networks.
[32] Xiaoming Fu,et al. Cloud-Assisted Data Fusion and Sensor Selection for Internet of Things , 2016, IEEE Internet of Things Journal.
[33] Jorge Sá Silva,et al. Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey , 2015, Ad Hoc Networks.
[34] Elijah Blessing Rajsingh,et al. Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks , 2018, Comput. Electr. Eng..
[35] Zhihua Zhang,et al. Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks , 2017, IEEE Access.
[36] Biplab Sikdar,et al. Secure Data Provenance for the Internet of Things , 2017, IoTPTS@AsiaCCS.
[37] Aamir Saeed Malik,et al. Trust management system in wireless sensor networks: design considerations and research challenges , 2015, Trans. Emerg. Telecommun. Technol..