A Mobile Multimedia Data Collection Scheme for Secured Wireless Multimedia Sensor Networks
暂无分享,去创建一个
Xiangjian He | Jinjun Chen | Muhammad Usman | Mian Ahmad Jan | Jinjun Chen | Xiangjian He | Muhammad Usman | M. Jan
[1] Xiangjian He,et al. A Sybil attack detection scheme for a forest wildfire monitoring application , 2018, Future Gener. Comput. Syst..
[2] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[3] A. Chilambuchelvan,et al. GSR: Geographic Secured Routing using SHA-3 algorithm for node and message authentication in wireless sensor networks , 2017, Future Gener. Comput. Syst..
[4] Xiangjian He,et al. PAWN: a payload‐based mutual authentication scheme for wireless sensor networks , 2017, Concurr. Comput. Pract. Exp..
[5] Sipra Das Bit,et al. A lightweight security scheme for query processing in clustered wireless sensor networks , 2015, Comput. Electr. Eng..
[6] Kyung-Ah Shim,et al. BASIS: A Practical Multi-User Broadcast Authentication Scheme in Wireless Sensor Networks , 2017, IEEE Transactions on Information Forensics and Security.
[7] Waqar Mahmood,et al. Internet of multimedia things: Vision and challenges , 2015, Ad Hoc Networks.
[8] Xiong Li,et al. A user friendly mutual authentication and key agreement scheme for wireless sensor networks using chaotic maps , 2016, Future Gener. Comput. Syst..
[9] Paolo Santi,et al. The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[10] Sipra Das Bit,et al. Ensuring Basic Security and Preventing Replay Attack in a Query Processing Application Domain in WSN , 2010, ICCSA.
[11] Jie Wu,et al. A ( ${M}$ , ${m}$ ) Authentication Scheme Against Mobile Sink Replicated Attack in Unattended Sensor Networks , 2018, IEEE Wireless Communications Letters.
[12] Yang Li,et al. A Comprehensive Trustworthy Data Collection Approach in Sensor-Cloud Systems , 2022, IEEE Transactions on Big Data.
[13] Ping Zhang,et al. A secure data collection scheme based on compressive sensing in wireless sensor networks , 2018, Ad Hoc Networks.
[14] Reihaneh Safavi-Naini,et al. An Efficient Signature Scheme from Bilinear Pairings and Its Applications , 2004, Public Key Cryptography.
[15] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[16] Xiangjian He,et al. Cryptography-based secure data storage and sharing using HEVC and public clouds , 2017, Inf. Sci..
[17] Daniel G. Costa,et al. Wireless visual sensor networks for smart city applications: A relevance-based approach for multiple sinks mobility , 2017, Future Gener. Comput. Syst..
[18] Muhammad Alam,et al. A payload-based mutual authentication scheme for Internet of Things , 2017, Future Gener. Comput. Syst..
[19] Muhammad Khurram Khan,et al. User authentication schemes for wireless sensor networks: A review , 2015, Ad Hoc Networks.
[20] Mehmet Hakan Karaata,et al. Imposter detection for replication attacks in mobile sensor networks , 2015, 2015 7th International Conference on New Technologies, Mobility and Security (NTMS).
[21] Sudip Misra,et al. TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks , 2016, IEEE Transactions on Computers.
[22] Fadi Al-Turjman,et al. Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks , 2017, IEEE Access.
[23] Xiangjian He,et al. Data Sharing in Secure Multimedia Wireless Sensor Networks , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[24] Xiangjian He,et al. A Joint Framework for QoS and QoE for Video Transmission over Wireless Multimedia Sensor Networks , 2018, IEEE Transactions on Mobile Computing.
[25] Mohammad Reza Meybodi,et al. A lightweight algorithm for detecting mobile Sybil nodes in mobile wireless sensor networks , 2017, Comput. Electr. Eng..