Detection of hidden data attacks combined fog computing and trust evaluation method in sensor‐cloud system

[1]  Hui Tian,et al.  Data collection from WSNs to the cloud based on mobile Fog elements , 2017, Future Gener. Comput. Syst..

[2]  Hongjie Li,et al.  A stochastic evolutionary coalition game model of secure and dependable virtual service in Sensor-Cloud , 2015, Appl. Soft Comput..

[3]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[4]  Fei Yuan,et al.  Data Density Correlation Degree Clustering Method for Data Aggregation in WSN , 2014, IEEE Sensors Journal.

[5]  Christine Julien,et al.  Efficient and Scalable Runtime Monitoring for Cyber–Physical System , 2018, IEEE Systems Journal.

[6]  Jie Wu,et al.  Dependable Structural Health Monitoring Using Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[7]  ShiNing Li,et al.  Sensor-cloud data acquisition based on fog computation and adaptive block compressed sensing , 2018, Int. J. Distributed Sens. Networks.

[8]  V Ram Prabha,et al.  Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks , 2017 .

[9]  Md Zakirul Alam Bhuiyan,et al.  Fog-Based Computing and Storage Offloading for Data Synchronization in IoT , 2019, IEEE Internet of Things Journal.

[10]  Madoka Yuriyama,et al.  Sensor-Cloud Infrastructure - Physical Sensor Management with Virtualized Sensors on Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[11]  Mohammad S. Obaidat,et al.  On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network , 2017, IEEE Systems Journal.

[12]  Anfeng Liu,et al.  Fog-based storage technology to fight with cyber threat , 2018, Future Gener. Comput. Syst..

[13]  Naixue Xiong,et al.  Design and Analysis of Probing Route to Defense Sink-Hole Attacks for Internet of Things Security , 2020, IEEE Transactions on Network Science and Engineering.

[14]  Elisa Bertino,et al.  A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.

[15]  Mohsen Guizani,et al.  An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[16]  Chuanlei Zhang,et al.  BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks , 2016, J. Netw. Comput. Appl..

[17]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[18]  Abdelhak Mourad Guéroui,et al.  A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks , 2016, Wirel. Pers. Commun..

[19]  Donghui Li,et al.  A Comprehensive Trust-Aware Routing Protocol With Multi-Attributes for WSNs , 2018, IEEE Access.

[20]  Junping Du,et al.  LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.

[21]  Jiang Zhu,et al.  Fog Computing: A Platform for Internet of Things and Analytics , 2014, Big Data and Internet of Things.

[22]  Rajkumar Buyya,et al.  Fog Computing: A Taxonomy, Survey and Future Directions , 2016, Internet of Everything.

[23]  Jie Wu,et al.  Big Data Reduction for a Smart City’s Critical Infrastructural Health Monitoring , 2018, IEEE Communications Magazine.

[24]  Zhetao Li,et al.  Minimizing Convergecast Time and Energy Consumption in Green Internet of Things , 2020, IEEE Transactions on Emerging Topics in Computing.

[25]  Emil C. Lupu,et al.  Detecting Malicious Data Injections in Wireless Sensor Networks , 2015, ACM Comput. Surv..

[26]  Athanasios V. Vasilakos,et al.  A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems , 2019, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[27]  Athanasios V. Vasilakos,et al.  Fog Computing for Sustainable Smart Cities , 2017, ArXiv.

[28]  Weijia Jia,et al.  A novel trust mechanism based on Fog Computing in Sensor-Cloud System , 2020, Future Gener. Comput. Syst..

[29]  Lynne E. Parker,et al.  Nearest neighbor imputation using spatial-temporal correlations in wireless sensor networks , 2014, Inf. Fusion.

[30]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[31]  Muhammad Arif,et al.  High-accuracy localization for indoor group users based on extended Kalman filter , 2018, Int. J. Distributed Sens. Networks.

[32]  Xiaoming Fu,et al.  Cloud-Assisted Data Fusion and Sensor Selection for Internet of Things , 2016, IEEE Internet of Things Journal.

[33]  Jorge Sá Silva,et al.  Security in the integration of low-power Wireless Sensor Networks with the Internet: A survey , 2015, Ad Hoc Networks.

[34]  Elijah Blessing Rajsingh,et al.  Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks , 2018, Comput. Electr. Eng..

[35]  Zhihua Zhang,et al.  Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks , 2017, IEEE Access.

[36]  Biplab Sikdar,et al.  Secure Data Provenance for the Internet of Things , 2017, IoTPTS@AsiaCCS.

[37]  Aamir Saeed Malik,et al.  Trust management system in wireless sensor networks: design considerations and research challenges , 2015, Trans. Emerg. Telecommun. Technol..