A trust-based minimum cost and quality aware data collection scheme in P2P network
Tóm tắt
Từ khóa
Tài liệu tham khảo
Gubbi J, Buyya R, Marusic S, Palaniswami M (2013) Internet of things (IoT): A vision, architectural elements, and future directions. Futur Gener Comput Syst 29(7):1645–1660
Saad S, Traore I, Ghorbani A, Sayed B, Zhao D, Lu W, ... & Hakimian, P (2011) Detecting P2P botnets through network behavior analysis and machine learning. In 2011 Ninth annual international conference on privacy, security and trust IEEE:174–180
Liu Y, Ma M, Liu X, Xiong N, Liu A, Zhu Y (2020) Design and Analysis of Probing Route to Defense Sink-hole Attacks for Internet of Things Security. IEEE Trans Netw Sci Eng 7(1):356–372
Teng H, Liu Y, Liu A, Xiong NN, Cai Z, Wang T, Liu X (2019) A novel code data dissemination scheme for internet of things through mobile vehicle of smart cities. Futur Gener Comput Syst 94:351–367
Liu Y, Liu A, Liu X, Huang X (2019) A statistical approach to participant selection in location-based social networks for offline event marketing. Inf Sci 480:90–108
Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of IoT for environmental condition monitoring in homes. IEEE Sensors J 13(10):3846–3853
Chung K, Park RC (2016) P2P cloud network services for IoT based disaster situations information. Peer-to-Peer Networking and Applications 9(3):566–577
Sanchez L, Muñoz L, Galache JA, Sotres P, Santana JR, Gutierrez V et al (2014) SmartSantander: IoT experimentation over a smart city testbed. Comput Netw 61:217–238
Schulz P, Matthe M, Klessig H, Simsek M, Fettweis G, Ansari J et al (2017) Latency critical IoT applications in 5G: perspective on the design of radio interface and network architecture. IEEE Commun Mag 55(2):70–78
Ren H, Li H, Dai Y, Yang K, Lin X (2018) Querying in internet of things with privacy preserving: challenges, solutions and opportunities. IEEE Netw 32(6):144–151
Liu X, Zhao M, Liu A, Wong KKL (2020) Adjusting forwarder nodes and duty cycle using packet aggregation routing for body sensor networks. Information Fusion 53:183–195
Chen M, Wang T, Ota K, Dong M, Zhao M, Liu A (2019) Intelligent resource allocation Management for Vehicles Network: an A3C learning approach. Comput Commun 151:485–494
Wang J, Wang F, Wang Y, Wang L, Qiu Z, Zhang D et al (2019) HyTasker: hybrid task allocation in Mobile crowd sensing. IEEE Trans Mob Comput. https://doi.org/10.1109/TMC.2019.2898950
Zhang G, Wang T, Wang G, Liu A, Jia W (2018) Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system. Practice and Experience, Concurrency and Computation. https://doi.org/10.1002/cpe.5109
Liu F, Tang G, Li Y, Cai Z, Zhang X, Zhou T (2019) A survey on edge computing systems and tools. Proc IEEE 107(8):1537–1562
Wu M, He S, Zhang Y, Chen J, Sun Y, Liu Y, Zhang J, Poor V (2019) A tensor-based framework for studying eigenvector multicentrality in multilayer networks. Proceedings of the National Academy of Sciences of the United States of America (PNAS) 116(31):15407–15413
Hao M., Li H., Luo X., Xu G., Yang H., & Liu S. (2019). Efficient and privacy-enhanced federated learning for industrial artificial intelligence. IEEE Transactions on Industrial Informatics DOI: https://doi.org/10.1109/TII.2019.2945367
Ren Y, Liu W, Wang T, Li X, Xiong N, Liu A (2019) A collaboration platform for effective task and data reporter selection in crowdsourcing network. IEEE Access 7:19238–19257
Liu Q, Tian Y, Wu J, Peng T, Wang G (2019) Enabling verifiable and dynamic ranked search over outsourced data. IEEE Trans Serv Comput. https://doi.org/10.1109/TSC.2019.2922177
Liu X, Liu Y, Zhang N, Wu W, Liu A (2019) Optimizing trajectory of unmanned aerial vehicles for efficient data acquisition: A matrix completion approach. IEEE Internet Things J 6(2):1829–1840
Martí IG, Rodríguez LE, Benedito M, Trilles S, Beltrán A, Díaz L, Huerta J (2012) Mobile application for noise pollution monitoring through gamification techniques. In International Conference on Entertainment Computing Springer, Berlin, Heidelberg, pp 562–571
Zhang N, Yang P, Ren J, Chen D, Yu L, Shen X (2018) Synergy of big data and 5g wireless networks: opportunities, approaches, and challenges. IEEE Wirel Commun 25(1):12–18
Liu Y, Liu A, Zhang N, Liu X, Ma M, Hu Y (2019) DDC: dynamic duty cycle for improving delay and energy efficiency in wireless sensor networks. J Netw Comput Appl 131:16–27
Thiagarajan A, Ravindranath L, LaCurts K, Madden S, Balakrishnan H, Toledo S, Eriksson J (2009) VTrack: accurate, energy-aware road traffic delay estimation using mobile phones. In proceedings of the 7th ACM conference on embedded networked sensor systems: 85-98.
Yu H, Shen Z, Miao C, An B (2012) Challenges and opportunities for trust management in crowdsourcing. In proceedings of the the 2012 IEEE/WIC/ACM international joint conferences on web intelligence and intelligent agent technology IEEE computer society, 02: 486-493.
Hu L., Liu A., Xie M., & Wang T. (2019). UAVs joint vehicles as data mules for fast codes dissemination for edge networking in smart city. Peer-to-Peer Networking and Applications:1–25
Liu Y, Liu A, Xiong NN, Wang T, Gui W (2019) Content propagation for content-centric networking systems from location-based social networks. IEEE Transactions on Systems, Man, and Cybernetics: Systems 49(10):1946–1960
Li H, Yang Y, Dai Y, Yu S, Xiang Y (2017) Achieving secure and efficient dynamic searchable symmetric encryption over medical cloud data. IEEE Transactions on Cloud Computing. https://doi.org/10.1109/TCC.2017.2769645
Zhang X, Xue G, Yu R, Yang D, Tang J (2015) Keep your promise: mechanism design against free-riding and false-reporting in crowdsourcing. IEEE Internet Things J 2(6):562–572
Zhang Y, Van der Schaar M (2012) Reputation-based incentive protocols in crowdsourcing applications. In 2012 proceedings IEEE INFOCOM: 2140-2148.
Xu G, Li H, Dai Y, Yang K, Lin X (2019) Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Transactions on Information Forensics and Security 14(4):870–885
Liu Q, Hou P, Wang G, Peng T, Zhang S (2019) Intelligent route planning on large road networks with efficiency and privacy. Journal of Parallel and Distributed Computing 133:93–106
Tan J, Liu W, Wang T, Zhao M, Liu A, Zhang S (2020) A high-accurate content popularity prediction computational modelling for Mobile edge computing by using matrix completion technology. Trans Emerg Telecommun Technol. https://doi.org/10.1002/ett.3871
Liu Y, Liu A, Liu X, Ma M (2019) A trust-based active detection for cyber-physical security in industrial environments. IEEE Transactions on Industrial Informatics 15(12):6593–6603
Chung K, Park RC (2016) P2P cloud network services for IoT based disaster situations information. Peer-to-Peer Networking and Applications 9(3):566–577
Xu G, Li H, Liu S, Yang K, Lin X (2020) VerifyNet: secure and verifiable federated learning. IEEE Transactions on Information Forensics and Security 15(1):911–926
Huang M, Liu W, Wang T, Liu A, Zhang S (2019) A cloud-MEC collaborative task offloading scheme with service orchestration. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2019.2952767
Behrend TS, Sharek DJ, Meade AW, Wiebe EN (2011) The viability of crowdsourcing for survey research. Behav Res Methods 43(3):800
Zhang N, Cheng N, Lu N, Zhang X, Mark JW, Shen XS (2015) Partner selection and incentive mechanism for physical layer security. IEEE Trans Wirel Commun 14(8):4265–4276
Xu G, Li H, Liu S, Yang K, Lin X (2019) VerifyNet: secure and verifiable federated learning. IEEE Transactions on Information Forensics and Security
Zheng Y, Lu R, Li B, Shao J, Yang H, Choo KKR (2019) Efficient privacy-preserving data merging and skyline computation over multi-source encrypted data. Inf Sci 498:91–105
Nabil M, Sherif A, Mahmoud M, Alsharif A, Abdallah M (2019) Efficient and privacy-preserving ridesharing Organization for Transferable and non-transferable services. IEEE Transactions on Dependable and Secure Computing
Wang T, Cao Z, Wang S, Wang J, Qi l.; Liu A.; Xie M.; Li X. (2019) Privacy-enhanced data collection based on deep learning for internet of vehicles. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2019.2962844
Hafeez KA, Zhao L, Ma B, Mark JW (2013) Performance analysis and enhancement of the DSRC for VANET's safety application. IEEE Tran on Vehicular Technology 62(7):3069–3083
Li H, Liu D, Dai Y, Luan TH, Yu S (2018) Personalized search over encrypted data with efficient and secure updates in Mobile clouds. IEEE Trans Emerg Top Comput 6(1):97–109
Wang T, Wang P, Cai S, Ma Y, Liu A, Xie M (2019) A unified trustworthy environment based on edge computing in industrial IoT. IEEE Transactions on Industrial Informatics. https://doi.org/10.1109/TII.2019.2955152
Lin J, Amini S, Hong JI, Sadeh N, Lindqvist J, Zhang J (2012) Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In proceedings of the 2012 ACM conference on ubiquitous computing: 501-510.
Agarwal Y, Hall M (2013) ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In proceeding of the 11th annual international conference on Mobile systems, applications, and services ACM: 97-110.
Toch E (2014) Crowdsourcing privacy preferences in context-aware applications. Pers Ubiquit Comput 18(1):129–141
To H, Ghinita G, Shahabi C (2014) A framework for protecting worker location privacy in spatial crowdsourcing. Proceedings of the VLDB Endowment 7(10):919–930
Wang Y, Cai Z, Yin G, Gao Y, Tong X, Wu G (2016) An incentive mechanism with privacy protection in mobile crowdsourcing systems. Comput Netw 102:157–171
Jiang W, Li H, Xu G, Wen M, Dong G, Lin X (2019) PTAS: privacy-preserving thin-client authentication scheme in blockchain-based PKI. Futur Gener Comput Syst 96:185–195
Liu X, Wang T, Jia W, Liu A, Chi K (2019) Quick convex hull-based rendezvous planning for delay-harsh mobile data gathering in disjoint sensor networks. IEEE Transactions on System, Man, and Cybernetics: Systems, DoI. https://doi.org/10.1109/TSMC.2019.2938790
Ren J, Guo H, Xu C, Zhang Y (2017) Serving at the edge: A scalable IoT architecture based on transparent computing. IEEE Netw 31(5):96–105
Li T, Zhao M, Won K (2020) Machine learning based code dissemination by selection of reliability Mobile vehicles in 5G networks. Comput Commun 152:109–118
Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. In proceedings of the 2014 IEEE/ACM international conference on computer-aided design IEEE press: 417-423.
Venanzi M, Rogers A, Jennings NR (2013) Trust-based fusion of untrustworthy information in crowdsourcing applications. In proceedings of the 2013 international conference on autonomous agents and multi-agent systems: 829-836.
Xu G, Li H, Ren H, Yang K, Deng RH (2019) Data security issues in deep learning: attacks, countermeasures and opportunities. IEEE Commun Mag 57(11):116–122
Peng M, Liu W, Wang T, Zeng Z (2020) Relay selection joint consecutive packet routing scheme to improve performance for wake-up radio-enabled WSNs. Wirel Commun Mob Comput 2020:1–32
Liu Y, Zeng Z, Liu X, Zhu X, Bhuiyan M (2019) A novel load balancing and low response delay framework for edge-cloud network based on SDN. IEEE Internet Things J. https://doi.org/10.1109/JIOT.2019.2951857
Ye B, Wang Y, Liu L (2015) Crowd trust: A context-aware trust model for worker selection in crowdsourcing environments. In 2015 IEEE international conference on web services : 121-128.
Gan X, Li Y, Wang W, Fu L, Wang X (2017) Social crowdsourcing to friends: An incentive mechanism for multi-resource sharing. IEEE Journal on Selected Areas in Communications 35(3):795–808
Xu G, Li H, Liu S, Yang K, Lin X (2020) VerifyNet: secure and verifiable federated learning. IEEE Transactions on Information Forensics and Security 15(1):911–926
Zhu X, An J, Yang M, Xiang L, Yang Q, Gui X (2016) A fair incentive mechanism for crowdsourcing in crowd sensing. IEEE Internet Things J 3(6):1364–1372
Zhang Y, Van der Schaar M (2012) Reputation-based incentive protocols in crowdsourcing applications. In 2012 proceedings IEEE INFOCOM: 2140-2148.