A Trust-Based Secure Routing Scheme Using the Traceback Approach for Energy-Harvesting Wireless Sensor Networks
暂无分享,去创建一个
Naixue Xiong | Zhiwen Zeng | Jian Zhang | Anfeng Liu | Tian Wang | Jiawei Tang | N. Xiong | Anfeng Liu | Jiawei Tang | Tian Wang | Z. Zeng | Jian Zhang
[1] Shibo He,et al. Leveraging Crowdsourcing for Efficient Malicious Users Detection in Large-Scale Social Networks , 2017, IEEE Internet of Things Journal.
[2] Guo-Tan Liao,et al. FBT: an efficient traceback scheme in hierarchical wireless sensor network , 2009, Secur. Commun. Networks.
[3] Xi Chen,et al. Dynamic power management and adaptive packet size selection for IoT in e-Healthcare , 2018, Comput. Electr. Eng..
[4] Anfeng Liu,et al. Quality Utilization Aware Based Data Gathering for Vehicular Communication Networks , 2018, Wirel. Commun. Mob. Comput..
[5] Naixue Xiong,et al. Knowledge-aware Proactive Nodes Selection approach for energy management in Internet of Things , 2017, Future Gener. Comput. Syst..
[6] Qinglei Kong,et al. Achieve Location Privacy-Preserving Range Query in Vehicular Sensing , 2017, Sensors.
[7] Jian Deng,et al. Multi-Hop Relay-Aided Underlay D2D Communications for Improving Cellular Coverage Quality , 2018, IEEE Access.
[8] Bo-Chao Cheng,et al. A packet marking with fair probability distribution function for minimizing the convergence time in wireless sensor networks , 2008, Comput. Commun..
[9] Jie Wu,et al. Understanding Graph-Based Trust Evaluation in Online Social Networks , 2016, ACM Comput. Surv..
[10] Hwee Pink Tan,et al. Energy-neutral scheduling and forwarding in environmentally-powered wireless sensor networks , 2013, Ad Hoc Networks.
[11] Panlong Yang,et al. R-TTWD: Robust Device-Free Through-The-Wall Detection of Moving Human With WiFi , 2017, IEEE Journal on Selected Areas in Communications.
[12] Xiao Liu,et al. Adaptive Transmission Power Control for Reliable Data Forwarding in Sensor Based Networks , 2018, Wirel. Commun. Mob. Comput..
[13] Anfeng Liu,et al. Green Data Gathering under Delay Differentiated Services Constraint for Internet of Things , 2018, Wirel. Commun. Mob. Comput..
[14] Matthew Ettus,et al. System capacity, latency, and power consumption in multihop-routed SS-CDMA wireless networks , 1998, Proceedings RAWCON 98. 1998 IEEE Radio and Wireless Conference (Cat. No.98EX194).
[15] Minyi Guo,et al. LSCD: A Low-Storage Clone Detection Protocol for Cyber-Physical Systems , 2016, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.
[16] Kai Zhou,et al. Flexible Adjustments Between Energy and Capacity for Topology Control in Heterogeneous Wireless Multi-hop Networks , 2016, Journal of Network and Systems Management.
[17] Naixue Xiong,et al. Integrated collaborative filtering recommendation in social cyber-physical systems , 2017, Int. J. Distributed Sens. Networks.
[18] Naixue Xiong,et al. A Trust With Abstract Information Verified Routing Scheme for Cyber-Physical Network , 2018, IEEE Access.
[19] Jianfeng Ma,et al. A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks , 2017, IEEE Internet of Things Journal.
[20] Anfeng Liu,et al. A Smart High-Speed Backbone Path Construction Approach for Energy and Delay Optimization in WSNs , 2018, IEEE Access.
[21] Hung-Min Sun,et al. An efficient countermeasure to the selective forwarding attack in wireless sensor networks , 2007, TENCON 2007 - 2007 IEEE Region 10 Conference.
[22] Sabato Manfredi,et al. Decentralized Control Algorithm for Fast Monitoring and Efficient Energy Consumption in Energy Harvesting Wireless Sensor Networks , 2017, IEEE Transactions on Industrial Informatics.
[23] Jianfeng Ma,et al. Verifiable Computation over Large Database with Incremental Updates , 2014, IEEE Transactions on Computers.
[24] Xiao Liu,et al. MDMA: A Multi-Data and Multi-ACK Verified Selective Forwarding Attack Detection Scheme in WSNs , 2016, IEICE Trans. Inf. Syst..
[25] Zhiwen Zeng,et al. A resource allocation model based on double-sided combinational auctions for transparent computing , 2018, Peer Peer Netw. Appl..
[26] Jie Wu,et al. Dependable Structural Health Monitoring Using Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[27] Driss Aboutajdine,et al. A Uniform Balancing Energy Routing Protocol for Wireless Sensor Networks , 2010, Wirel. Pers. Commun..
[28] Qing Liu,et al. On the hybrid using of unicast-broadcast in wireless sensor networks , 2017, Comput. Electr. Eng..
[29] Xiao Liu,et al. A Time and Location Correlation Incentive Scheme for Deep Data Gathering in Crowdsourcing Networks , 2018, Wirel. Commun. Mob. Comput..
[30] Anfeng Liu,et al. A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs , 2015 .
[31] Terence D. Todd,et al. Energy Provisioning in Solar-Powered Wireless Mesh Networks , 2010, IEEE Transactions on Vehicular Technology.
[32] Toshitaka Tsuda,et al. Data Driven Cyber-Physical System for Landslide Detection , 2019, Mob. Networks Appl..
[33] Qiang Liu,et al. A Survey on Security-Aware Measurement in SDN , 2018, Secur. Commun. Networks.
[34] Mani B. Srivastava,et al. Power management in energy harvesting sensor networks , 2007, TECS.
[35] Jin Li,et al. A Hybrid Cloud Approach for Secure Authorized Deduplication , 2015, IEEE Transactions on Parallel and Distributed Systems.
[36] Naixue Xiong,et al. QTSAC: An Energy-Efficient MAC Protocol for Delay Minimization in Wireless Sensor Networks , 2018, IEEE Access.
[37] Fang Liu,et al. Security and Privacy in the Medical Internet of Things: A Review , 2018, Secur. Commun. Networks.
[38] Athanasios V. Vasilakos,et al. False Data Injection on State Estimation in Power Systems—Attacks, Impacts, and Defense: A Survey , 2017, IEEE Transactions on Industrial Informatics.
[39] Kok-Keong Loo,et al. Real-Time Cross-Layer Design: Real-time cross-layer design for a large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks , 2009 .
[40] Laurence T. Yang,et al. Trace malicious source to guarantee cyber security for mass monitor critical infrastructure , 2018, J. Comput. Syst. Sci..
[41] G. Lakpathi,et al. Identity-Based Encryption with Outsourced Revocation in Cloud Computing , 2016 .
[42] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[43] Xiao Liu,et al. Learning-based synchronous approach from forwarding nodes to reduce the delay for Industrial Internet of Things , 2018, EURASIP J. Wirel. Commun. Netw..
[44] Vijay K. Bhargava,et al. Wireless sensor networks with energy harvesting technologies: a game-theoretic approach to optimal energy management , 2007, IEEE Wireless Communications.
[45] Jie Wu,et al. e-Sampling , 2017, ACM Trans. Auton. Adapt. Syst..
[46] Jun Xu,et al. Traceback in wireless sensor networks with packet marking and logging , 2011, Frontiers of Computer Science in China.
[47] Mianxiong Dong,et al. QUOIN: Incentive Mechanisms for Crowd Sensing Networks , 2018, IEEE Network.
[48] Xiao Liu,et al. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs , 2017, Sensors.
[49] Andrew G. Barto,et al. Adaptive Control of Duty Cycling in Energy-Harvesting Wireless Sensor Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[50] Anfeng Liu,et al. Cross-layer design for reducing delay and maximizing lifetime in industrial wireless sensor networks , 2018, EURASIP J. Wirel. Commun. Netw..
[51] S. Peng,et al. Prediction free energy neutral power management for energy harvesting wireless sensor nodes , 2014, Ad Hoc Networks.
[52] M. Shruthi,et al. Secure Distributed Deduplication Systems with Improved Reliability , 2016 .
[53] Guihai Chen,et al. Quality of Energy Provisioning for Wireless Power Transfer , 2015, IEEE Transactions on Parallel and Distributed Systems.
[54] Chor Ping Low,et al. Throughput optimal energy neutral management for energy harvesting wireless sensor networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[55] Yusheng Ji,et al. Distributed hole-bypassing protocol in WSNs with constant stretch and load balancing , 2017, Comput. Networks.
[56] Xiao Liu,et al. Big program code dissemination scheme for emergency software-define wireless sensor networks , 2018, Peer-to-Peer Netw. Appl..
[57] Anfeng Liu,et al. An Aggregate Signature Based Trust Routing for Data Gathering in Sensor Networks , 2018, Secur. Commun. Networks.
[58] Bo Yu,et al. CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..
[59] Naixue Xiong,et al. An adaptive virtual relaying set scheme for loss-and-delay sensitive WSNs , 2018, Inf. Sci..