TIGER: A Trust-based Intelligent Geographical Energy-aware Routing for Smart Grid Communication Networks
暂无分享,去创建一个
William Liu | Quan Bai | Ming Xiang | William Liu | Ming-Sen Xiang | Q. Bai
[1] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[2] William Stallings,et al. THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.
[3] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.
[4] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[5] K. J. Ray Liu,et al. A scalable multicast key management scheme for heterogeneous wireless networks , 2004, IEEE/ACM Transactions on Networking.
[6] Mohsen Guizani,et al. Cognitive radio based hierarchical communications infrastructure for smart grid , 2011, IEEE Network.
[7] Inhyuk Kim,et al. NeoMAN: Negotiation Management Method for IKE Protocol Based on X.509 , 2008, 2008 International Conference on Advanced Language Processing and Web Information Technology.
[8] Todd Baumeister,et al. Literature Review on Smart Grid Cyber Security , 2010 .
[9] P. Georgiadis,et al. Performance evaluation of a self-evolving trust building framework , 2005, Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, 2005..
[10] Hamid Sharif,et al. A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges , 2013, IEEE Communications Surveys & Tutorials.
[11] Robert C. Green,et al. A multi-level communication architecture of smart grid based on congestion aware wireless mesh network , 2011, 2011 North American Power Symposium.
[12] Antonio Liotta,et al. A wireless mesh communication protocol for smart-metering , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).
[13] Mohd Anwar,et al. Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[14] Blerim Rexha,et al. Increasing user privacy in online transactions with X.509 v3 certificate private extensions and smartcards , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).
[15] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[16] Warwick Ford,et al. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework , 2003, RFC.