Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks

Journal of Parallel and Distributed Computing - Tập 135 - Trang 140-155 - 2020
Xiao Liu1, Anfeng Liu1, Tian Wang2, Kaoru Ota3, Mianxiong Dong3, Yuxin Liu1, Zhiping Cai4
1School of Computer Science and Engineering, Central South University, Changsha 410083, China
2College of Computer Science and Technology, Huaqiao University, Xiamen 361021, China
3Department of Information and Electronic Engineering, Muroran Institute of Technology, Muroran 0508585, Japan
4Department of Network Engineering, School of Computer, National University of Defense Technology, Changsha, Hunan 410073, China

Tóm tắt

Từ khóa


Tài liệu tham khảo

Alrawais, 2017, Fog computing for the Internet of Things: Security and privacy issues, IEEE Internet Comput., 21, 34, 10.1109/MIC.2017.37

Badawy, 2010, Energy provisioning in solar-powered wireless mesh networks, IEEE Trans. Veh. Technol., 59, 3859, 10.1109/TVT.2010.2064797

Cai, 2017, IoT-based big data storage systems in cloud computing: Perspectives and challenges, IEEE Internet Things J., 4, 75, 10.1109/JIOT.2016.2619369

Casadei, 2019, Modelling and simulation of opportunistic ioT services with aggregate computing, Future Gener. Comput. Syst., 91, 252, 10.1016/j.future.2018.09.005

Chen, 2017, Distributed duty cycle control for delay improvement in wireless sensor networks, Peer-to-Peer Netw. Appl., 10, 559, 10.1007/s12083-016-0501-0

He, 2018, Energy-efficient power allocation with individual and sum power constraints, IEEE Trans. Wireless Commun., 17, 5353, 10.1109/TWC.2018.2842204

He, 2014, Recursive waterfilling for wireless links with energy harvesting transmitters, IEEE Trans. Veh. Technol., 63, 1232, 10.1109/TVT.2013.2283505

Hu, 2019, UAVs joint vehicles as data mules for fast codes dissemination for edge networking in smart city, Peer-to-Peer Netw. Appl., 10.1007/s12083-019-00752-0

Jun, 2011, Traceback in wireless sensor networks with packet marking and logging, Front. Comput. Sci., 5, 308, 10.1007/s11704-011-0361-y

Kamruzzaman, 2018, Acoustic sensor networks in the Internet of Things applications, Future Gener. Comput. Syst., 86, 1167, 10.1016/j.future.2018.05.019

Karuppiah, 2018, Introduction to the special section on Big data and IoT in e-healthcare, Comput. Electr. Eng., 65, 261, 10.1016/j.compeleceng.2018.01.007

Lee, 2017, Secure mobile device structure for trust IoT, J. Supercomput., 1

Li, 2019, An intelligence-driven security-aware defense mechanism for advanced persistent threats, IEEE Trans. Inf. Forensics Secur., 14, 646, 10.1109/TIFS.2018.2847671

Li, 2019, Optimal power allocation for wireless sensor powered by dedicated RF energy source, IEEE Trans. Veh. Technol., 68, 2791, 10.1109/TVT.2019.2892770

Li, 2019, Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications, Peer-to-Peer Netw. Appl., 10.1007/s12083-019-00753-z

Li, 2018, Defending against the advanced persistent threat: An optimal control approach, Secur. Commun. Netw., 2018, 1

Liang, 2019, Trust-based distributed kalman filtering for target tracking under malicious cyber attacks, Inf. Fusion, 46, 44, 10.1016/j.inffus.2018.04.002

Lin, 2013, Reducing communication delay by finding sink location in low-duty-cycle wireless sensor networks, 136

Liu, 2018, Trace malicious source to guarantee cyber security for mass monitor critical infrastructure, J. Comput. System Sci., 98, 1, 10.1016/j.jcss.2016.09.008

Liu, 2018, Big program code dissemination scheme for emergency software-define wireless sensor networks, Peer-to-Peer Netw. Appl., 11, 1038, 10.1007/s12083-017-0565-5

Liu, 2015, A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs, AEU - Int. J. Electron. Commun., 69, 1464, 10.1016/j.aeue.2015.06.016

Liu, 2019, A trust-based active detection for cyber-physical security in industrial environments, IEEE Trans. Ind. Inf., 10.1109/TII.2019.2931394

Liu, 2019, Content propagation for content-centric networking from location-based social networks, IEEE Trans. Syst. Man Cybernet.-Syst., 10.1109/TSMC.2019.2898982

Liu, 2018, Design and analysis of probing route to defense sink-hole attacks for Internet of Things security, IEEE Trans. Netw. Sci. Eng., 10.1109/TNSE.2018.2881152

Liu, 2017, Achieving reliable and secure services in cloud computing environments, Comput. Electr. Eng., 59, 153, 10.1016/j.compeleceng.2016.10.005

Liu, 2020, Adjusting forwarder nodes and duty cycle using packet aggregation routing for body sensor networks, Inf. Fusion, 53, 183, 10.1016/j.inffus.2019.06.020

Luo, 2017, Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks, Future Gener. Comput. Syst., 68, 222, 10.1016/j.future.2016.09.013

Mahdikhani, 2018, Achieving privacy-preserving multi dot-product query in fog computing-enhanced IoT

National Solar Radiation Data Base, DENVER/CENTENNIAL [GOLDEN-NREL], CO. Available: https://rredc.nrel.gov/solar/old_data/nsrdb/1991-2010/hourly/list_by_USAFN.html.

Puthal, 2018, Secure computing for the Internet of Things and network edges: Protecting communication in the worldwide network of devices, IEEE Consum. Electron. Mag., 7, 29, 10.1109/MCE.2018.2851738

Shemaili, 2013, Securing E-seal real time tracking system for Internet of Things, 65

Singh, 2017, A joint routing and MAC protocol for transmission delay reduction in many-to-one communication paradigm for wireless sensor networks, IEEE Internet Things J., 4, 1031, 10.1109/JIOT.2017.2724762

Su, 2018, A secure charging scheme for electric vehicles with smart communities in energy blockchain, IEEE Internet Things J.

Wu, 2019, Big data logs analysis based on seq2seq networks for cognitive Internet of Things, Future Gener. Comput. Syst., 90, 477, 10.1016/j.future.2018.08.021

Xiao, 2014, Community-aware opportunistic routing in mobile social networks, IEEE Trans. Comput., 63, 1682, 10.1109/TC.2013.55

Xiao, 2015, Home-based zero-knowledge multi-copy routing in mobile social networks, IEEE Trans. Parallel Distrib. Syst., 26, 1238, 10.1109/TPDS.2014.2319211

Xiao, 2015, Time-sensitive utility-based single-copy routing in low-duty-cycle wireless sensor networks, IEEE Trans. Parallel Distrib. Syst., 26, 1452, 10.1109/TPDS.2014.2321136

Xiao, 2017, Online task assignment for crowdsensing in predictable mobile social networks, IEEE Trans. Mob. Comput., 16, 2306, 10.1109/TMC.2016.2616473

Yassine, 2019, IoT big data analytics for smart homes with fog and cloud computing, Future Gener. Comput. Syst., 91, 563, 10.1016/j.future.2018.08.040

Zhang, 2018, Enhancing privacy through uniform grid and caching in location-based services, Future Gener. Comput. Syst., 86, 881, 10.1016/j.future.2017.06.022

Zhang, 2018, Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system, Concurr. Comput.: Pract. Exp., 10.1002/cpe.5109

Zhao, 2019, Secure multi-party computation: Theory, practice and applications, Inform. Sci., 476, 357, 10.1016/j.ins.2018.10.024