Aura: An incentive-driven ad-hoc IoT cloud framework for proximal mobile computation offloading
暂无分享,去创建一个
[1] Alexis Olivereau,et al. HIP Tiny Exchange (TEX): A distributed key exchange scheme for HIP-based Internet of Things , 2012, Third International Conference on Communications and Networking.
[2] Ragib Hasan,et al. HSC-IoT: A Hardware and Software Co-Verification Based Authentication Scheme for Internet of Things , 2017, 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).
[3] Michael Luck,et al. A Protocol for Recording Provenance in Service-Oriented Grids , 2004, OPODIS.
[4] Roberto Baldoni,et al. On-line failure prediction in safety-critical systems , 2015, Future Gener. Comput. Syst..
[5] Jörg Henkel,et al. Computation offloading and resource allocation for low-power IoT edge devices , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).
[6] Tony Q. S. Quek,et al. Offloading in Mobile Edge Computing: Task Allocation and Computational Frequency Scaling , 2017, IEEE Transactions on Communications.
[7] Marisol García-Valls,et al. Integration of Data Distribution Service and Raspberry Pi , 2017, GPC.
[8] Long Bao Le,et al. Computation offloading leveraging computing resources from edge cloud and mobile peers , 2017, 2017 IEEE International Conference on Communications (ICC).
[9] Ragib Hasan,et al. MIDEP: Multiparty Identity Establishment Protocol for Decentralized Collaborative Services , 2015, 2015 IEEE International Conference on Services Computing.
[10] Mojtaba Alizadeh,et al. Challenges and opportunities of Mobile Cloud Computing , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[11] Emiliano Miluzzo,et al. Vision: mClouds - computing on clouds of mobile devices , 2012, MCS '12.
[12] Kyung Sup Kwak,et al. The IoT: Exciting Possibilities for Bettering Lives: Special application scenarios , 2016, IEEE Consumer Electronics Magazine.
[13] Douglas Thain,et al. Distributed computing in practice: the Condor experience , 2005, Concurr. Pract. Exp..
[14] Guohong Cao,et al. Energy-Efficient Computation Offloading in Cellular Networks , 2015, 2015 IEEE 23rd International Conference on Network Protocols (ICNP).
[15] Georg Carle,et al. A DTLS based end-to-end security architecture for the Internet of Things with two-way authentication , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.
[16] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[17] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.
[18] John L. Romkey,et al. Nonstandard for transmission of IP datagrams over serial lines: SLIP , 1988, RFC.
[19] Kyoungho An,et al. A cloud middleware for assuring performance and high availability of soft real-time applications , 2014, J. Syst. Archit..
[20] Ragib Hasan,et al. Boot-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of IoT Nodes , 2017, 2017 IEEE International Congress on Internet of Things (ICIOT).
[21] Ragib Hasan,et al. Aura: An IoT Based Cloud Infrastructure for Localized Mobile Computation Outsourcing , 2015, 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.
[22] Gail-Joon Ahn,et al. Security and Privacy Challenges in Cloud Computing Environments , 2010, IEEE Security & Privacy.
[23] Anis Koubaa,et al. RPL in a nutshell: A survey , 2012, Comput. Networks.
[24] Rajkumar Buyya,et al. Outsourcing Resource-Intensive Tasks from Mobile Apps to Clouds: Android and Aneka Integration , 2014, 2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM).
[25] Timothy Grance,et al. Guidelines on Security and Privacy in Public Cloud Computing | NIST , 2012 .
[26] Rajkumar Buyya,et al. A Review on Distributed Application Processing Frameworks in Smart Mobile Devices for Mobile Cloud Computing , 2013, IEEE Communications Surveys & Tutorials.
[27] Marten van Dijk,et al. On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing , 2010, HotSec.
[28] Majid Sarrafzadeh,et al. Dynamic Computation Offloading for Low-Power Wearable Health Monitoring Systems , 2017, IEEE Transactions on Biomedical Engineering.
[29] Óscar García-Morchón,et al. Securing the IP-based internet of things with HIP and DTLS , 2013, WiSec '13.
[30] Carsten Bormann. Constrained Application Protocol (CoAP) over IEEE 802.15.4 Information Element for IETF , 2016 .
[31] Feng Xia,et al. Phone2Cloud: Exploiting computation offloading for energy saving on smartphones in mobile cloud computing , 2013, Information Systems Frontiers.
[32] Bharat K. Bhargava,et al. A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.
[33] Soe-Tsyr Yuan,et al. A Privacy-Aware Identity Design for Exploring Ubiquitous Collaborative Wisdom , 2007, International Conference on Computational Science.
[34] Ragib Hasan,et al. CellCloud: A Novel Cost Effective Formation of Mobile Cloud Based on Bidding Incentives , 2014, 2014 IEEE 7th International Conference on Cloud Computing.
[35] Pekka Nikander,et al. Host Identity Protocol , 2005 .
[36] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[37] Vijay S. Pande,et al. Folding@home: Lessons from eight years of volunteer distributed computing , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[38] Paramvir Bahl,et al. The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.
[39] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[40] Alexis Olivereau,et al. D-HIP: A distributed key exchange scheme for HIP-based Internet of Things , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[41] Ragib Hasan,et al. Interaction provenance model for unified authentication factors in service oriented computing , 2014, CODASPY '14.
[42] Eui-Nam Huh,et al. Cloud of Things: Integrating Internet of Things and cloud computing and the issues involved , 2014, Proceedings of 2014 11th International Bhurban Conference on Applied Sciences & Technology (IBCAST) Islamabad, Pakistan, 14th - 18th January, 2014.
[43] Namhi Kang,et al. Lightweight secure communication for CoAP-enabled Internet of Things using delegated DTLS handshake , 2014, 2014 International Conference on Information and Communication Technology Convergence (ICTC).
[44] Tommaso Cucinotta,et al. Challenges in real-time virtualization and predictable cloud computing , 2014, J. Syst. Archit..
[45] Gabriel Montenegro,et al. IPv6 over Low-Power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals , 2007, RFC.
[46] Seng Wai Loke,et al. Computing with Nearby Mobile Devices: A Work Sharing Algorithm for Mobile Edge-Clouds , 2019, IEEE Transactions on Cloud Computing.
[47] Alagan Anpalagan,et al. Intercloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges, and Optimization , 2017, IEEE Network.
[48] Hovav Shacham,et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds , 2009, CCS.
[49] Ragib Hasan,et al. Fuzzy Authentication Using Interaction Provenance in Service Oriented Computing , 2015, 2015 IEEE International Conference on Services Computing.
[50] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[51] Vinod Ganapathy,et al. Privacy-aware identity management for client-side mashup applications , 2009, DIM '09.
[52] Wayne A. Jansen,et al. Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.
[53] Marisol Garcia Valls,et al. iLAND: An Enhanced Middleware for Real-Time Reconfiguration of Service Oriented Distributed Real-Time Systems , 2013 .
[54] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[55] Vijayaraghavan Soundararajan,et al. Challenges in building scalable virtualized datacenter management , 2010, OPSR.
[56] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[57] Klaus Wehrle,et al. Slimfit — A HIP DEX compression layer for the IP-based Internet of Things , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[58] Kun-Lung Wu,et al. Dynamic Load Balancing for Ordered Data-Parallel Regions in Distributed Streaming Systems , 2016, Middleware.
[59] Mohamed Ayoub Messous,et al. Computation offloading game for an UAV network in mobile edge computing , 2017, 2017 IEEE International Conference on Communications (ICC).
[60] Wei Liu,et al. Computation offloading strategy for multi user mobile data streaming applications , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[61] Jonathan Loo,et al. Specification-based IDS for securing RPL from topology attacks , 2011, 2011 IFIP Wireless Days (WD).
[62] Ragib Hasan,et al. A Cloud You Can Wear: Towards a Mobile and Wearable Personal Cloud , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[63] László Bokor,et al. Survey and Evaluation of Advanced Mobility Management Schemes in the Host Identity Layer , 2014, Int. J. Wirel. Networks Broadband Technol..
[64] Doan B. Hoang,et al. Mobile Cloud for Assistive Healthcare (MoCAsH) , 2010, 2010 IEEE Asia-Pacific Services Computing Conference.
[65] Hai Jin,et al. Container-Based Cloud Platform for Mobile Computation Offloading , 2017, 2017 IEEE International Parallel and Distributed Processing Symposium (IPDPS).
[66] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[67] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[68] Stefano Secci,et al. Cloud-based computation offloading for mobile devices: State of the art, challenges and opportunities , 2013, 2013 Future Network & Mobile Summit.
[69] Ke Zhang,et al. Energy-Efficient Offloading for Mobile Edge Computing in 5G Heterogeneous Networks , 2016, IEEE Access.
[70] Maurizio A. Spirito,et al. DEMO: An IDS framework for internet of things empowered by 6LoWPAN , 2013, CCS.
[71] Athanasios V. Vasilakos,et al. Mobile Cloud Computing: A Survey, State of Art and Future Directions , 2013, Mobile Networks and Applications.