Managing Privacy in a Social Broker Internet of Thing
暂无分享,去创建一个
Vincenza Carchiolo | Alessandro Longheu | Michele Malgeri | Giuseppe Mangioni | G. Mangioni | M. Malgeri | A. Longheu | V. Carchiolo
[1] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[2] Larry J. Greenstein,et al. Fingerprints in the Ether: Using the Physical Layer for Wireless Authentication , 2007, 2007 IEEE International Conference on Communications.
[3] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[4] HyunGon Kim,et al. Protection Against Packet Fragmentation Attacks at 6LoWPAN Adaptation Layer , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[5] Prem Prakash Jayaraman,et al. Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation , 2017, Future Gener. Comput. Syst..
[6] Rodrigo Roman,et al. On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.
[7] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[8] Yasir Saleem,et al. SCDIoT: Social Cross-Domain IoT Enabling Application-to-Application Communications , 2018, 2018 IEEE International Conference on Cloud Engineering (IC2E).
[9] Chong Kuan Chen,et al. IoT Security: Ongoing Challenges and Research Opportunities , 2014, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications.
[10] Kevin Weekly,et al. Evaluating sinkhole defense techniques in RPL networks , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[11] Mahmoud Ammar,et al. Journal of Information Security and Applications , 2022 .
[12] Hong Linh Truong,et al. MQTT-S — A publish/subscribe protocol for Wireless Sensor Networks , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).
[13] Rolf H. Weber,et al. Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..
[14] Bernt Schiele,et al. Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts , 2001, UbiComp.
[15] Yacine Challal,et al. A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.
[16] Muhammad Khurram Khan,et al. Design of sinkhole node detection mechanism for hierarchical wireless sensor networks , 2016, Secur. Commun. Networks.
[17] Guevara Noubir,et al. Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.
[18] Mohammad Hayajneh,et al. Data Management for the Internet of Things: Design Primitives and Solution , 2013, Sensors.
[19] Hanno Wirtz,et al. 6LoWPAN fragmentation attacks and mitigation mechanisms , 2013, WiSec '13.
[20] Larry J. Greenstein,et al. Channel-Based Detection of Sybil Attacks in Wireless Networks , 2009, IEEE Transactions on Information Forensics and Security.
[21] Pierangela Samarati,et al. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression , 1998 .
[22] Shui Yu,et al. Big Privacy: Challenges and Opportunities of Privacy Study in the Age of Big Data , 2016, IEEE Access.
[23] N. Truong,et al. A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things , 2016 .
[24] Fabio Viola,et al. A Multi-Broker Platform for the Internet of Things , 2015, NEW2AN.
[25] Dushantha Nalin K. Jayakody,et al. Cooperative trust relaying and privacy preservation via edge-crowdsourcing in social Internet of Things , 2017, Future Gener. Comput. Syst..
[26] Rabia Riaz,et al. Security analysis survey and framework design for IP connected LoWPANs , 2009, 2009 International Symposium on Autonomous Decentralized Systems.
[27] Richard P. Martin,et al. Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[28] Vincenza Carchiolo,et al. The Cost of Trust in the Dynamics of Best Attachment , 2015, Comput. Informatics.
[29] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[30] O VikasB,et al. Internet of Things (IoT): A Survey on Privacy Issues and Security , 2015 .
[31] Steve Vinoski,et al. Advanced Message Queuing Protocol , 2006, IEEE Internet Computing.
[32] Wan Choi,et al. Enhanced Secrecy in Stochastic Wireless Networks: Artificial Noise With Secrecy Protected Zone , 2014, IEEE Transactions on Information Forensics and Security.
[33] Dhiren Patel,et al. A Survey on Internet of Things: Security and Privacy Issues , 2014 .
[34] Longfei Wu,et al. A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.
[35] Ravi Sankar,et al. A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.
[36] Vincenza Carchiolo,et al. A Social Inspired Broker for M2M Protocols , 2019, COMPLEXIS.
[37] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[38] Lorenzo Mucchi,et al. The Role of Physical Layer Security in IoT: A Novel Perspective , 2016, Inf..
[39] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[40] Vincenza Carchiolo,et al. PROSA: P2P Resource Organisation by Social Acquaintances , 2006, AP2PC.
[41] Vincenza Carchiolo,et al. Direct trust assignment using social reputation and aging , 2017, J. Ambient Intell. Humaniz. Comput..