TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing
暂无分享,去创建一个
Wei Chen | Yang Liu | Wuxiong Zhang | Chaogang Tang | Weidong Fang | Weidong Fang | Wei Chen | Wuxiong Zhang | Chaogang Tang | Yang Liu
[1] Mikael Gidlund,et al. Priority-Aware Wireless Fieldbus Protocol for Mixed-Criticality Industrial Wireless Sensor Networks , 2019, IEEE Sensors Journal.
[2] Heng Wang,et al. Estimation of Clock Skew for Time Synchronization Based on Two-Way Message Exchange Mechanism in Industrial Wireless Sensor Networks , 2018, IEEE Transactions on Industrial Informatics.
[3] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[4] Amir Hussain,et al. A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications , 2018, Cognitive Computation.
[5] Hsiao-Hwa Chen,et al. An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications , 2014, IEEE Internet of Things Journal.
[6] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[7] Huafeng Wu,et al. A rank-based application-driven resilient reputation framework model for wireless sensor networks , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[8] Arijit Ukil. Trust and Reputation Based Collaborating Computing in Wireless Sensor Networks , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.
[9] Wei Liang,et al. A new authentication protocol for healthcare applications using wireless medical sensor networks with user anonymity , 2016, Secur. Commun. Networks.
[10] Victor C. M. Leung,et al. Secure Resource Allocation for OFDMA Two-Way Relay Wireless Sensor Networks Without and With Cooperative Jamming , 2016, IEEE Transactions on Industrial Informatics.
[11] Razvan Tataroiu,et al. Adaptive Trust Management Protocol based on intrusion detection for Wireless Sensor Networks , 2013, 2013 RoEduNet International Conference 12th Edition: Networking in Education and Research.
[12] Aditya K. Jagannatham,et al. Gaussian trust and reputation for fading MIMO wireless sensor networks , 2014, 2014 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT).
[13] Jianbin Hu,et al. A Data-Centric Trust Evaluation Mechanism in Wireless Sensor Networks , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.
[14] GuoDong Li,et al. A grey-based decision-making approach to the supplier selection problem , 2007, Math. Comput. Model..
[15] Yang Yang,et al. A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution , 2017, Science China Information Sciences.
[16] Frank Y. Li,et al. Subjective Logic-Based In-Network Data Processing for Trust Management in Collocated and Distributed Wireless Sensor Networks , 2018, IEEE Sensors Journal.
[17] Kang Yen,et al. Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.
[18] Nabila Labraoui. A reliable trust management scheme in wireless sensor networks , 2015, 2015 12th International Symposium on Programming and Systems (ISPS).
[19] Victor C. M. Leung,et al. Improving physical-layer security in wireless communications using diversity techniques , 2014, IEEE Network.
[20] K ManikandanMS,et al. Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks , 2018, EURASIP Journal on Wireless Communications and Networking.
[21] Fang Fang,et al. A reputation management scheme based on multi-factor in WSNs , 2013, Proceedings 2013 International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC).
[22] Yang Liu,et al. TME2R: Trust Management-Based Energy Efficient Routing Scheme in Fog-Assisted Industrial Wireless Sensor Network , 2019, 5GWN.
[23] Srikanth V. Krishnamurthy,et al. Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.
[24] Rui Wang,et al. ETMRM: An Energy-efficient Trust Management and Routing Mechanism for SDWSNs , 2018, Comput. Networks.
[25] Li Sun,et al. Fountain-Coding Aided Strategy for Secure Cooperative Transmission in Industrial Wireless Sensor Networks , 2016, IEEE Transactions on Industrial Informatics.
[26] Taekyoung Kwon,et al. FlexiCast: Energy-Efficient Software Integrity Checks to Build Secure Industrial Wireless Active Sensor Networks , 2016, IEEE Transactions on Industrial Informatics.
[27] Ayman I. Kayssi,et al. CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks , 2012, 2012 Tenth Annual International Conference on Privacy, Security and Trust.
[28] Ayman I. Kayssi,et al. TRACE: A centralized Trust And Competence-based Energy-efficient routing scheme for wireless sensor networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[29] Ping Wang,et al. Research and implementation on the security scheme of industrial wireless network , 2011, The International Conference on Information Networking 2011 (ICOIN2011).
[30] Wonyong Yoon,et al. Design of scalable SDN based eMBMS/WLAN network architecture assisted by Fog Computing , 2018, 2018 International Conference on Information and Communication Technology Convergence (ICTC).
[31] Tanveer A. Zia,et al. Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks , 2010, 2010 International Conference on Availability, Reliability and Security.
[32] Roberto Uribeetxeberria,et al. Reputation-based Intrusion Detection System for wireless sensor networks , 2012, 2012 Complexity in Engineering (COMPENG). Proceedings.
[33] Athanasios V. Vasilakos,et al. Security and privacy challenges in mobile cloud computing: Survey and way ahead , 2017, J. Netw. Comput. Appl..
[34] Gerhard P. Hancke,et al. Using Cognitive Radio for Interference-Resistant Industrial Wireless Sensor Networks: An Overview , 2015, IEEE Transactions on Industrial Informatics.
[35] Baoling Qin,et al. Research and Application of Intelligent Internet of Vehicles Model Based on Fog Computing , 2019, 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC).
[36] José Luis Míguez,et al. The use of grey-based methods in multi-criteria decision analysis for the evaluation of sustainable energy systems: A review , 2015 .
[37] Baoyu Zheng,et al. Physical-Layer Security and Reliability Challenges for Industrial Wireless Sensor Networks , 2017, IEEE Access.
[38] Junaid Akram,et al. Efficient Resource Utilization in Cloud-Fog Environment Integrated with Smart Grids , 2018, 2018 International Conference on Frontiers of Information Technology (FIT).
[39] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[40] Yue Qi,et al. Security Analysis of WIA-PA Protocol , 2014 .
[41] Chuanlei Zhang,et al. BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks , 2016, J. Netw. Comput. Appl..