Energy Efficiency in Security of 5G-Based IoT: An End-to-End Adaptive Approach
暂无分享,去创建一个
Abdelmadjid Bouabdallah | Hamed Hellaoui | Mouloud Koudil | A. Bouabdallah | Hamed Hellaoui | M. Koudil
[1] Mohamed F. Younis,et al. Adaptive security provision for increased energy efficiency in Wireless Sensor Networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.
[2] Laura Galluccio,et al. SDN-WISE: Design, prototyping and experimentation of a stateful SDN solution for WIreless SEnsor networks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).
[3] Giacomo Morabito,et al. Software Defined Wireless Networks: Unbridling SDNs , 2012, 2012 European Workshop on Software Defined Networking.
[4] Alberto Ferrante,et al. QoS and security in energy-harvesting wireless sensor networks , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[5] Jennifer C. Hou,et al. On deriving the upper bound of α-lifetime for large sensor networks , 2004, MobiHoc '04.
[6] Alberto Ferrante,et al. Gradual adaptation of security for sensor networks , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).
[7] Xenofon Fafoutis,et al. Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[8] Yu Meng,et al. A Novel Deployment Scheme for Green Internet of Things , 2014, IEEE Internet of Things Journal.
[9] Mohamed Hamdi,et al. Game-based adaptive security in the Internet of Things for eHealth , 2014, 2014 IEEE International Conference on Communications (ICC).
[10] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[11] Xiaoqi Li,et al. A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[12] Yuanqing Xia,et al. Optimal Online Data Dissemination for Resource Constrained Mobile Opportunistic Networks , 2017, IEEE Transactions on Vehicular Technology.
[13] Mahesh K. Marina,et al. Group Communications in Narrowband-IoT: Architecture, Procedures, and Evaluation , 2018, IEEE Internet of Things Journal.
[14] Yu Wang,et al. Mitigating Interference via Power Control for Two-Tier Femtocell Networks: A Hierarchical Game Approach , 2019, IEEE Transactions on Vehicular Technology.
[15] Yu Wang,et al. Delay-Constrained Utility Maximization for Video Ads Push in Mobile Opportunistic D2D Networks , 2018, IEEE Internet of Things Journal.
[16] Abdelmadjid Bouabdallah,et al. TAS-IoT: Trust-Based Adaptive Security in the IoT , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).
[17] Yinghua Ye,et al. Resource-aware self-adaptive security provisioning in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[18] Tarik Taleb,et al. "Anything as a Service" for 5G Mobile Systems , 2016, IEEE Network.
[19] Dominique Barthel,et al. Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks , 2012, RFC.
[20] Hwee Pink Tan,et al. Sensor OpenFlow: Enabling Software-Defined Wireless Sensor Networks , 2012, IEEE Communications Letters.
[21] Anantha Chandrakasan,et al. Bounding the lifetime of sensor networks via optimal role assignments , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[22] Abdelmadjid Bouabdallah,et al. Energy-efficient mechanisms in security of the internet of things: A survey , 2017, Comput. Networks.
[23] Jeffrey G. Andrews,et al. What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.
[24] Stephen E. Deering,et al. Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification , 2006, RFC.
[25] Falko Dressler,et al. On the lifetime of wireless sensor networks , 2009, TOSN.
[26] P. Keeratiwintakorn,et al. Energy Efficient Security Services for Limited Wireless Devices , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[27] Bin Han,et al. Network Slicing to Enable Scalability and Flexibility in 5G Mobile Networks , 2017, IEEE Communications Magazine.
[28] Adam Dunkels,et al. Cross-Level Sensor Network Simulation with COOJA , 2006, Proceedings. 2006 31st IEEE Conference on Local Computer Networks.
[29] Philip Levis,et al. RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks , 2012, RFC.