Adaptive data and verified message disjoint security routing for gathering big data in energy harvesting networks
Tóm tắt
Từ khóa
Tài liệu tham khảo
Alrawais, 2017, Fog computing for the Internet of Things: Security and privacy issues, IEEE Internet Comput., 21, 34, 10.1109/MIC.2017.37
Badawy, 2010, Energy provisioning in solar-powered wireless mesh networks, IEEE Trans. Veh. Technol., 59, 3859, 10.1109/TVT.2010.2064797
Cai, 2017, IoT-based big data storage systems in cloud computing: Perspectives and challenges, IEEE Internet Things J., 4, 75, 10.1109/JIOT.2016.2619369
Casadei, 2019, Modelling and simulation of opportunistic ioT services with aggregate computing, Future Gener. Comput. Syst., 91, 252, 10.1016/j.future.2018.09.005
Chen, 2017, Distributed duty cycle control for delay improvement in wireless sensor networks, Peer-to-Peer Netw. Appl., 10, 559, 10.1007/s12083-016-0501-0
He, 2018, Energy-efficient power allocation with individual and sum power constraints, IEEE Trans. Wireless Commun., 17, 5353, 10.1109/TWC.2018.2842204
He, 2014, Recursive waterfilling for wireless links with energy harvesting transmitters, IEEE Trans. Veh. Technol., 63, 1232, 10.1109/TVT.2013.2283505
Hu, 2019, UAVs joint vehicles as data mules for fast codes dissemination for edge networking in smart city, Peer-to-Peer Netw. Appl., 10.1007/s12083-019-00752-0
Jun, 2011, Traceback in wireless sensor networks with packet marking and logging, Front. Comput. Sci., 5, 308, 10.1007/s11704-011-0361-y
Kamruzzaman, 2018, Acoustic sensor networks in the Internet of Things applications, Future Gener. Comput. Syst., 86, 1167, 10.1016/j.future.2018.05.019
Karuppiah, 2018, Introduction to the special section on Big data and IoT in e-healthcare, Comput. Electr. Eng., 65, 261, 10.1016/j.compeleceng.2018.01.007
Lee, 2017, Secure mobile device structure for trust IoT, J. Supercomput., 1
Li, 2019, An intelligence-driven security-aware defense mechanism for advanced persistent threats, IEEE Trans. Inf. Forensics Secur., 14, 646, 10.1109/TIFS.2018.2847671
Li, 2019, Optimal power allocation for wireless sensor powered by dedicated RF energy source, IEEE Trans. Veh. Technol., 68, 2791, 10.1109/TVT.2019.2892770
Li, 2019, Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications, Peer-to-Peer Netw. Appl., 10.1007/s12083-019-00753-z
Li, 2018, Defending against the advanced persistent threat: An optimal control approach, Secur. Commun. Netw., 2018, 1
Liang, 2019, Trust-based distributed kalman filtering for target tracking under malicious cyber attacks, Inf. Fusion, 46, 44, 10.1016/j.inffus.2018.04.002
Lin, 2013, Reducing communication delay by finding sink location in low-duty-cycle wireless sensor networks, 136
Liu, 2018, Trace malicious source to guarantee cyber security for mass monitor critical infrastructure, J. Comput. System Sci., 98, 1, 10.1016/j.jcss.2016.09.008
Liu, 2018, Big program code dissemination scheme for emergency software-define wireless sensor networks, Peer-to-Peer Netw. Appl., 11, 1038, 10.1007/s12083-017-0565-5
Liu, 2015, A novel joint logging and migrating traceback scheme for achieving low storage requirement and long lifetime in WSNs, AEU - Int. J. Electron. Commun., 69, 1464, 10.1016/j.aeue.2015.06.016
Liu, 2019, A trust-based active detection for cyber-physical security in industrial environments, IEEE Trans. Ind. Inf., 10.1109/TII.2019.2931394
Liu, 2019, Content propagation for content-centric networking from location-based social networks, IEEE Trans. Syst. Man Cybernet.-Syst., 10.1109/TSMC.2019.2898982
Liu, 2018, Design and analysis of probing route to defense sink-hole attacks for Internet of Things security, IEEE Trans. Netw. Sci. Eng., 10.1109/TNSE.2018.2881152
Liu, 2017, Achieving reliable and secure services in cloud computing environments, Comput. Electr. Eng., 59, 153, 10.1016/j.compeleceng.2016.10.005
Liu, 2020, Adjusting forwarder nodes and duty cycle using packet aggregation routing for body sensor networks, Inf. Fusion, 53, 183, 10.1016/j.inffus.2019.06.020
Luo, 2017, Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks, Future Gener. Comput. Syst., 68, 222, 10.1016/j.future.2016.09.013
Mahdikhani, 2018, Achieving privacy-preserving multi dot-product query in fog computing-enhanced IoT
National Solar Radiation Data Base, DENVER/CENTENNIAL [GOLDEN-NREL], CO. Available: https://rredc.nrel.gov/solar/old_data/nsrdb/1991-2010/hourly/list_by_USAFN.html.
Puthal, 2018, Secure computing for the Internet of Things and network edges: Protecting communication in the worldwide network of devices, IEEE Consum. Electron. Mag., 7, 29, 10.1109/MCE.2018.2851738
Shemaili, 2013, Securing E-seal real time tracking system for Internet of Things, 65
Singh, 2017, A joint routing and MAC protocol for transmission delay reduction in many-to-one communication paradigm for wireless sensor networks, IEEE Internet Things J., 4, 1031, 10.1109/JIOT.2017.2724762
Su, 2018, A secure charging scheme for electric vehicles with smart communities in energy blockchain, IEEE Internet Things J.
Wu, 2019, Big data logs analysis based on seq2seq networks for cognitive Internet of Things, Future Gener. Comput. Syst., 90, 477, 10.1016/j.future.2018.08.021
Xiao, 2014, Community-aware opportunistic routing in mobile social networks, IEEE Trans. Comput., 63, 1682, 10.1109/TC.2013.55
Xiao, 2015, Home-based zero-knowledge multi-copy routing in mobile social networks, IEEE Trans. Parallel Distrib. Syst., 26, 1238, 10.1109/TPDS.2014.2319211
Xiao, 2015, Time-sensitive utility-based single-copy routing in low-duty-cycle wireless sensor networks, IEEE Trans. Parallel Distrib. Syst., 26, 1452, 10.1109/TPDS.2014.2321136
Xiao, 2017, Online task assignment for crowdsensing in predictable mobile social networks, IEEE Trans. Mob. Comput., 16, 2306, 10.1109/TMC.2016.2616473
Yassine, 2019, IoT big data analytics for smart homes with fog and cloud computing, Future Gener. Comput. Syst., 91, 563, 10.1016/j.future.2018.08.040
Zhang, 2018, Enhancing privacy through uniform grid and caching in location-based services, Future Gener. Comput. Syst., 86, 881, 10.1016/j.future.2017.06.022
Zhang, 2018, Detection of hidden data attacks combined fog computing and trust evaluation method in sensor-cloud system, Concurr. Comput.: Pract. Exp., 10.1002/cpe.5109