Ensuring trustworthiness for P2P-based M2M applications
暂无分享,去创建一个
[1] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[2] Michael Devetsikiotis,et al. Blockchains and Smart Contracts for the Internet of Things , 2016, IEEE Access.
[3] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[4] Roy H. Campbell,et al. World of Empowered IoT Users , 2016, 2016 IEEE First International Conference on Internet-of-Things Design and Implementation (IoTDI).
[5] Armin Lehmann,et al. Framework for automated functional testing of P2P-based M2M applications , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).
[6] Apostolos Malatras,et al. State-of-the-art survey on P2P overlay networks in pervasive computing environments , 2015, J. Netw. Comput. Appl..
[7] John R. Vacca. Computer and Information Security Handbook , 2009 .
[8] Mudhakar Srivatsa,et al. Vulnerabilities and security threats in structured overlay networks: a quantitative analysis , 2004, 20th Annual Computer Security Applications Conference.
[9] Sheila Anand,et al. A survey on Security Issues of Reputation Management Systems for Peer-to-Peer Networks , 2012, Comput. Sci. Rev..
[10] Giuseppe Ciaccio,et al. Recipient Anonymity in a Structured Overlay , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).
[11] Abdelmadjid Bouabdallah,et al. M2M Security: Challenges and Solutions , 2016, IEEE Communications Surveys & Tutorials.
[12] Xiao Nie,et al. M2M security threat and security mechanism research , 2013, Proceedings of 2013 3rd International Conference on Computer Science and Network Technology.
[13] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[14] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[15] Ralph Deters,et al. Using Blockchain to push Software-Defined IoT Components onto Edge Hosts , 2016, BDAW '16.
[16] Bogdan Ghita,et al. Decentralised system architecture for autonomous and cooperative M2M application service provision , 2017, 2017 IEEE International Conference on Smart Grid and Smart Cities (ICSGSC).
[17] Klemens Böhm,et al. Malicious behaviour in content-addressable peer-to-peer networks , 2005, 3rd Annual Communication Networks and Services Research Conference (CNSR'05).
[18] Jia Guo,et al. Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.
[19] Rakesh Kumar,et al. The FastTrack overlay: A measurement study , 2006, Comput. Networks.
[20] Zeinab Movahedi,et al. A Trust-Based Offloading for Mobile M2M Communications , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[21] Vallipuram Muthukkumarasamy,et al. Securing Smart Cities Using Blockchain Technology , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).
[22] Joan Arnedo-Moreno,et al. A survey on security in JXTA applications , 2009, J. Syst. Softw..
[23] Bogdan V. Ghita,et al. P2p-based community concept for M2M applications , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).
[24] João H. Kleinschmidt,et al. Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme , 2015, Int. J. Distributed Sens. Networks.
[25] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[26] Maher Khemakhem,et al. Taxonomy of Structured P2P Overlay Networks Security Attacks , 2012 .
[27] Guy Pujolle,et al. Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[28] Shawn Wilkinson,et al. Storj A Peer-to-Peer Cloud Storage Network , 2014 .
[29] Martin Kappes,et al. Netzwerk- und Datensicherheit , 2013 .
[30] Jane Yung-jen Hsu,et al. Building Smart M2M Applications Using the WuKong Profile Framework , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
[31] Jon Crowcroft,et al. A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.
[32] Djamal Zeghlache,et al. Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..