-
2
-
-
82755186159
-
Advances in cyber-physical systems research
-
Wan, J., Yan, H., Suo, H., & Li, F. (2011). Advances in cyber-physical systems research. KSII Transactions on Internet and Information Systems,5(11), 1891–1908.
-
(2011)
KSII Transactions on Internet and Information Systems
, vol.5
, Issue.11
, pp. 1891-1908
-
-
Wan, J.1
Yan, H.2
Suo, H.3
Li, F.4
-
4
-
-
84863914858
-
-
ACM, New York:
-
Hachem, S., Teixeira, T., & Issarny, V. (2011). Ontologies for the internet of things (pp. 1–6). New York: ACM.
-
(2011)
Ontologies for the internet of things
, pp. 1-6
-
-
Hachem, S.1
Teixeira, T.2
Issarny, V.3
-
5
-
-
78650942089
-
Vision and challenges for realising the internet of things
-
Sundmaeker, H., Guillemin, P., Friess, P., & Woelfflé, S. (2010). Vision and challenges for realising the internet of things. Cluster of European Research Projects on the Internet of Things—CERP IoT.
-
(2010)
Cluster of European Research Projects on the Internet of Things—CERP IoT
-
-
Sundmaeker, H.1
Guillemin, P.2
Friess, P.3
Woelfflé, S.4
-
6
-
-
0037086890
-
Wireless sensor networks: A survey
-
Akyildiz, I. F., Su, W., Sanakarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks,38(4), 393–422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sanakarasubramaniam, Y.3
Cayirci, E.4
-
7
-
-
70249128685
-
Energy-aware security in M-Commerce and the internet of things
-
Hamad, F., Smalov, L., & James, A. (2009). Energy-aware security in M-Commerce and the internet of things. IETE TechmeM review,26(5), 357–362.
-
(2009)
IETE TechmeM review
, vol.26
, Issue.5
, pp. 357-362
-
-
Hamad, F.1
Smalov, L.2
James, A.3
-
9
-
-
60149097098
-
Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel
-
Mathur, S., Trappe, W., Mandayam, N., Ye, C., & Reznik, A. (2008) Radio-telepathy: Extracting a secret key from an unauthenticated wireless channel. In Proceedings of MobiCom (pp. 128–139).
-
(2008)
In Proceedings of MobiCom
, pp. 128-139
-
-
Mathur, S.1
Trappe, W.2
Mandayam, N.3
Ye, C.4
Reznik, A.5
-
10
-
-
3142596446
-
Crypto-based identifiers (CBIDs): Concepts and applications
-
Montenegro, G., & Castelluccia, C. (2004). Crypto-based identifiers (CBIDs): Concepts and applications. ACM Transactions on Information and System Security,7(1), 97–127.
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.1
, pp. 97-127
-
-
Montenegro, G.1
Castelluccia, C.2
-
13
-
-
84910146430
-
-
Blass, E. O., Elkhiyaoui, K., & Molva, R
-
Blass, E. O., Elkhiyaoui, K., & Molva, R. (2011). Tracker: security and privacy for RFID based supply chains. In Proceeding of the 18th network and distributed system security symposium.
-
(2011)
Tracker: security and privacy for RFID based supply chains. In Proceeding of the 18th network and distributed system security symposium
-
-
-
14
-
-
84860657792
-
-
Elkhiyaoui, K., Blass, E. O., & Molva, R
-
Elkhiyaoui, K., Blass, E. O., & Molva, R. (2012). CHECKER: On-site checking in RFID-based supply chains. In Proceedings of the fifth ACM conference on security and privacy in wireless and mobile networks.
-
(2012)
CHECKER: On-site checking in RFID-based supply chains. In Proceedings of the fifth ACM conference on security and privacy in wireless and mobile networks
-
-
-
15
-
-
76649131520
-
Spatial–temporal relation-based energy-efficient reliable routing protocol in wireless sensor networks
-
Chen, M., Kwon, T., Mao, S., & Leung, V. (2009). Spatial–temporal relation-based energy-efficient reliable routing protocol in wireless sensor networks. International Journal of Sensor Networks,5(3), 129–141.
-
(2009)
International Journal of Sensor Networks
, vol.5
, Issue.3
, pp. 129-141
-
-
Chen, M.1
Kwon, T.2
Mao, S.3
Leung, V.4
-
16
-
-
84861019658
-
Security in the internet of things: a review
-
Suo, H., Wan, J., Zou, C., & Liu, J. (2012). Security in the internet of things: a review. In Proceedings of the IEEE international conference on computer science and electronics engineering (ICCSEE), (vol. 3, pp. 648–651).
-
(2012)
In Proceedings of the IEEE international conference on computer science and electronics engineering (ICCSEE)
, vol.3
, pp. 648-651
-
-
Suo, H.1
Wan, J.2
Zou, C.3
Liu, J.4
-
17
-
-
84910123959
-
-
Ye, T., Peng, Q. M., & Ru, Z. H. (2012). IoT’s perception layer, network layer and application layer security analysis. Accessed 12 Oct 2013
-
Ye, T., Peng, Q. M., & Ru, Z. H. (2012). IoT’s perception layer, network layer and application layer security analysis.http://www.iot-online.com/jishuwenku/2012/1029/22888.html. Accessed 12 Oct 2013.
-
-
-
-
18
-
-
84910112698
-
Security analysis and security model research on IoT
-
Liu, B., Chen, H., Wang, H. T., & Fu, Y. (2012). Security analysis and security model research on IoT. Computer & Digital Engineering,40(11), 21–24.
-
(2012)
Computer & Digital Engineering
, vol.40
, Issue.11
, pp. 21-24
-
-
Liu, B.1
Chen, H.2
Wang, H.T.3
Fu, Y.4
-
19
-
-
84883726912
-
-
Suo, H., Liu, Z., Wan, J., & Zhou, K
-
Suo, H., Liu, Z., Wan, J., & Zhou, K. (2013). Security and privacy in mobile cloud computing. In Proceedings of the 9th IEEE international wireless communications and mobile computing conference (pp. 655–659), Cagliari, Italy.
-
(2013)
Security and privacy in mobile cloud computing. In Proceedings of the 9th IEEE international wireless communications and mobile computing conference (pp. 655–659), Cagliari, Italy
-
-
-
20
-
-
84880050834
-
From machine-to-machine communications towards cyber-physical systems
-
Wan, J., Chen, M., Xia, F., Li, D., & Zhou, K. (2013). From machine-to-machine communications towards cyber-physical systems. Computer Science and Information Systems,10(3), 1105–1128.
-
(2013)
Computer Science and Information Systems
, vol.10
, Issue.3
, pp. 1105-1128
-
-
Wan, J.1
Chen, M.2
Xia, F.3
Li, D.4
Zhou, K.5
-
21
-
-
0036498641
-
A generic middleware-based platform for scalable cluster computing
-
De Turck, F., Vanhastel, S., Volckaert, B., & Demeester, P. (2002). A generic middleware-based platform for scalable cluster computing. Future Generation Computer Systems,18(4), 549–560.
-
(2002)
Future Generation Computer Systems
, vol.18
, Issue.4
, pp. 549-560
-
-
De Turck, F.1
Vanhastel, S.2
Volckaert, B.3
Demeester, P.4
-
22
-
-
84910117088
-
Service-oriented middleware model for internet of things
-
Tan, Y. S., & Han, J. J. (2011). Service-oriented middleware model for internet of things. Computer Science,38(BIO), 3.
-
(2011)
Computer Science
, vol.38
, Issue.BIO
, pp. 3
-
-
Tan, Y.S.1
Han, J.J.2
-
23
-
-
84910129794
-
Overview of ubiquitous networking and of its support in NGN
-
ITU-T. Recommendation Y
-
ITU-T. Recommendation Y. 2002. (2010). Overview of ubiquitous networking and of its support in NGN. Geneva: ITU.
-
(2010)
Geneva: ITU
-
-
-
24
-
-
32844471136
-
An introduction to RFID technology
-
Want, R. (2006). An introduction to RFID technology. IEEE Pervasive Computing,5(1), 25–33.
-
(2006)
IEEE Pervasive Computing
, vol.5
, Issue.1
, pp. 25-33
-
-
Want, R.1
-
25
-
-
78049233831
-
Security characteristic and technology in the internet of things
-
Yang, G., Xu, J., Chen, W., Qi, Z. H., & Wang, H. Y. (2010). Security characteristic and technology in the internet of things. Journal of Nanjing University of Posts and Telecommunications (Natural science),4, 20–29.
-
(2010)
Journal of Nanjing University of Posts and Telecommunications (Natural science)
, vol.4
, pp. 20-29
-
-
Yang, G.1
Xu, J.2
Chen, W.3
Qi, Z.H.4
Wang, H.Y.5
-
26
-
-
84885589116
-
Cloud-enabled wireless body area networks for pervasive healthcare
-
Wan, J., Zou, C., Ullah, S., Lai, C., Zhou, M., & Wang, X. (2013). Cloud-enabled wireless body area networks for pervasive healthcare. IEEE Network,27(5), 56–61.
-
(2013)
IEEE Network
, vol.27
, Issue.5
, pp. 56-61
-
-
Wan, J.1
Zou, C.2
Ullah, S.3
Lai, C.4
Zhou, M.5
Wang, X.6
-
27
-
-
84910129180
-
EPC radio-frequency identity protocol Class-1 Generation-2 UHF RFID protocols for communications at 800 MHz-960 MHz, Ver. 1.0.9
-
EPC Global. (2004). EPC radio-frequency identity protocol Class-1 Generation-2 UHF RFID protocols for communications at 800 MHz-960 MHz, Ver. 1.0.9, EPC Global.
-
(2004)
EPC Global
-
-
Global, E.P.C.1
-
28
-
-
84898828128
-
VCMIA: A novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing
-
Wan, J., Zhang, D., Sun, Y., Lin, K., Zou, C., & Cai, H. (2014). VCMIA: A novel architecture for integrating vehicular cyber-physical systems and mobile cloud computing. ACM/Springer Mobile Networks and Applications,19(2), 153–160.
-
(2014)
ACM/Springer Mobile Networks and Applications
, vol.19
, Issue.2
, pp. 153-160
-
-
Wan, J.1
Zhang, D.2
Sun, Y.3
Lin, K.4
Zou, C.5
Cai, H.6
-
31
-
-
84910133208
-
Research progress and application of RFID anti-collision algorithm
-
Lv, B. Y., Pan, J. X., Ma, Q., & Xiao, Z. H. (2008). Research progress and application of RFID anti-collision algorithm. In Proceedings of the international conference on telecommunication engineering (vo1. 48, no. 7, pp. 124–128).
-
(2008)
In Proceedings of the international conference on telecommunication engineering (vo1
, vol.48
, Issue.7
, pp. 124-128
-
-
Lv, B.Y.1
Pan, J.X.2
Ma, Q.3
Xiao, Z.H.4
-
33
-
-
42749098390
-
A novel solution to the reader collision problem in RFID system
-
Wang, D., Wang, J. W., & Zhao, Y. P. (2006). A novel solution to the reader collision problem in RFID system. In Proceeding of the IEEE wireless communications, networking and mobile computing (WiCOM 06) (pp. 1–4).
-
(2006)
In Proceeding of the IEEE wireless communications, networking and mobile computing (WiCOM
, vol.6
, pp. 1-4
-
-
Wang, D.1
Wang, J.W.2
Zhao, Y.P.3
-
34
-
-
70349673740
-
An improved reader anti-collision algorithm based on pulse protocol with slot occupied probability in dense reader mode
-
Song, I. C., Hong, S. H., & Chang, K. H. (2009). An improved reader anti-collision algorithm based on pulse protocol with slot occupied probability in dense reader mode. In Proceeding of the IEEE 69th vehicular technology conference (pp. 1–5).
-
(2009)
In Proceeding of the IEEE 69th vehicular technology conference
, pp. 1-5
-
-
Song, I.C.1
Hong, S.H.2
Chang, K.H.3
-
35
-
-
33748338562
-
Effect of localized optimal clustering for reader anti-collision in RFID networks: Fairness aspects to the readers
-
Kim, J., Lee, W., Yu, J., Myung, J., Kim, E., & Lee, C. (2005). Effect of localized optimal clustering for reader anti-collision in RFID networks: Fairness aspects to the readers. In Proceeding of the IEEE international conference on computer communications and networks (pp. 497–502).
-
(2005)
In Proceeding of the IEEE international conference on computer communications and networks
, pp. 497-502
-
-
Kim, J.1
Lee, W.2
Yu, J.3
Myung, J.4
Kim, E.5
Lee, C.6
-
36
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Weis, S. A., Sarma, S. E., Rivest, R. L., & Engels, D. W. (2004). Security and privacy aspects of low-cost radio frequency identification systems. Security in Pervasive Computing,2802, 201–212.
-
(2004)
Security in Pervasive Computing
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
37
-
-
84893234476
-
Blocker-type method for protecting customers’ privacy in RFID systems
-
Blaskiewicz, P., Klonowski, M., Majcher, K., & Syga, P. (2013). Blocker-type method for protecting customers’ privacy in RFID systems. In Proceedings of the IEEE international conference on cyber-enabled distributed computing and knowledge discovery (CyberC) (pp. 89–96).
-
(2013)
In Proceedings of the IEEE international conference on cyber-enabled distributed computing and knowledge discovery (CyberC)
, pp. 89-96
-
-
Blaskiewicz, P.1
Klonowski, M.2
Majcher, K.3
Syga, P.4
-
38
-
-
77954775144
-
Code-centric RFID system based on software agent intelligence
-
Chen, M., Gonzalez, S., Zhang, Q., & Leung, V. (2010). Code-centric RFID system based on software agent intelligence. IEEE Intelligent Systems,25(2), 12–19.
-
(2010)
IEEE Intelligent Systems
, vol.25
, Issue.2
, pp. 12-19
-
-
Chen, M.1
Gonzalez, S.2
Zhang, Q.3
Leung, V.4
-
39
-
-
42149195728
-
Maintaining privacy in RFID enabled environments. Privacy, security and trust within the context of pervasive computing (pp
-
Berlin: Springer
-
Spiekermann, S., & Berthold, O. (2005). Maintaining privacy in RFID enabled environments. Privacy, security and trust within the context of pervasive computing (pp. 137–146). Berlin: Springer.
-
(2005)
137–146)
-
-
Spiekermann, S.1
Berthold, O.2
-
41
-
-
18744409344
-
The blocker tag: Selective blocking of RFID tags for consumer privacy
-
Juels, A., Rivest, R. L., & Szydlo, M. (2003). The blocker tag: Selective blocking of RFID tags for consumer privacy. In Proceedings of the 10th ACM conference on computer and communications security (CCS 2003), (pp. 103–111).
-
(2003)
In Proceedings of the 10th ACM conference on computer and communications security (CCS
, vol.2003
, pp. 103-111
-
-
Juels, A.1
Rivest, R.L.2
Szydlo, M.3
-
42
-
-
84910122061
-
-
MIT, Cambridge, MA:
-
Ohkubo, M., Suzuki, K., & Kinoshita, S. (2003). Cryptographic approach to privacy- friendly tags. RFID privacy workshop (p. 82). Cambridge, MA: MIT.
-
(2003)
Cryptographic approach to privacy- friendly tags. RFID privacy workshop
, pp. 82
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
43
-
-
84910141158
-
Nonidentifiable anonymous—ID scheme for RFID privacy protection
-
Kinos, S., Hoshino, F., Komuro, T., Fujimura, A., & Ohkubo, M. (2003). Nonidentifiable anonymous—ID scheme for RFID privacy protection. Computer Security Symposium.
-
(2003)
Computer Security Symposium
-
-
Kinos, S.1
Hoshino, F.2
Komuro, T.3
Fujimura, A.4
Ohkubo, M.5
-
45
-
-
78651481337
-
The T2TIT—Thing to thing in the internet of things-project
-
T2TIT Research Group. (2006). The T2TIT—Thing to thing in the internet of things-project. ANR.
-
(2006)
ANR
-
-
-
46
-
-
84910149275
-
-
T2TIT project. (May 2010). Accessed 12 Oct 2013
-
T2TIT project. (May 2010). http://www.infres.enst.fr/wp/blog/2009/11/20/t2titthings-to-things-in-the-internet-of-things-sesames-award-2009/. Accessed 12 Oct 2013.
-
-
-
-
47
-
-
78651479497
-
HAT: HIP address translation protocol for hybrid RFID/IP internet of things communication
-
Toumi, K., Ayari, M., Saidane, L., A., Bouet, M., & Pujolle, G. (2010). HAT: HIP address translation protocol for hybrid RFID/IP internet of things communication. TUNISIA: International conference on wireless and ubiquitous systems (pp. 1–7).
-
(2010)
TUNISIA: International conference on wireless and ubiquitous systems
, pp. 1-7
-
-
Toumi, K.1
Ayari, M.2
Saidane, L.3
-
50
-
-
84964253672
-
Mobile multimedia sensor networks: Architecture and routing
-
Chen, M., Lai, C., & Wang, H. (2011). Mobile multimedia sensor networks: Architecture and routing. EURASIP Journal on Wireless Communications and Networking,2011(1), 1–9.
-
(2011)
EURASIP Journal on Wireless Communications and Networking
, vol.2011
, Issue.1
, pp. 1-9
-
-
Chen, M.1
Lai, C.2
Wang, H.3
-
51
-
-
84880538357
-
Algorithm design for data communications in duty-cycled wireless sensor networks: A survey
-
Han, K., Luo, J., Liu, Y., & Vasilakos, V. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine,51(7), 107–113.
-
(2013)
IEEE Communications Magazine
, vol.51
, Issue.7
, pp. 107-113
-
-
Han, K.1
Luo, J.2
Liu, Y.3
Vasilakos, V.4
-
53
-
-
84889567969
-
A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues
-
Li, M., Li, Z., & Vasilakos, V. (2013). A survey on topology control in wireless sensor networks: Taxonomy, comparative study, and open issues. Proceedings of the IEEE,101(12), 2538–2557.
-
(2013)
Proceedings of the IEEE
, vol.101
, Issue.12
, pp. 2538-2557
-
-
Li, M.1
Li, Z.2
Vasilakos, V.3
-
55
-
-
10044284351
-
LEAP: efficient security mechanisms for large-scale distributed sensor networks
-
Zhu, S., Setia, S., & Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceeding of ACM CCS (pp. 62–72).
-
(2003)
In Proceeding of ACM CCS
, pp. 62-72
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
56
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless Ad Hoc networks
-
Hu, Y. C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless Ad Hoc networks. Ad Hoc Networks,1(1), 175–192.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.C.1
Johnson, D.B.2
Perrig, A.3
-
57
-
-
84867804047
-
An evolutionary multiobjective sleep-scheduling scheme for differentiated coverage in wireless sensor networks
-
Sengupta, S., Das, S., Nasir, M., Vasilakos, V., & Pedrycz, W. (2012). An evolutionary multiobjective sleep-scheduling scheme for differentiated coverage in wireless sensor networks. IEEE Transactions on Systems, Man, and Cybernetics, Part C,42(6), 1093–1102.
-
(2012)
IEEE Transactions on Systems, Man, and Cybernetics, Part C
, vol.42
, Issue.6
, pp. 1093-1102
-
-
Sengupta, S.1
Das, S.2
Nasir, M.3
Vasilakos, V.4
Pedrycz, W.5
-
58
-
-
25844530844
-
New constructions on broadcast encryption and key pre-distribution schemes
-
Huang, C. H., & Du, D. Z. (2005). New constructions on broadcast encryption and key pre-distribution schemes. IEEE INFOCOM,1, 515–523.
-
(2005)
IEEE INFOCOM
, vol.1
, pp. 515-523
-
-
Huang, C.H.1
Du, D.Z.2
-
59
-
-
33646581008
-
Energy analysis of public-key cryptography for wireless sensor networks
-
Wander, A. S., Gura, N., Eberle, H., Gupta, V., & Shantz, S. C. (2005). Energy analysis of public-key cryptography for wireless sensor networks. In Proceedings of the IEEE international conference on pervasive computing and communications (pp. 324–328).
-
(2005)
In Proceedings of the IEEE international conference on pervasive computing and communications
, pp. 324-328
-
-
Wander, A.S.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Shantz, S.C.5
-
61
-
-
84877704816
-
-
Al-Turjman, F. M., Al-Fagih, A. E., Alsalih, W. M., & Hassanein, H. S
-
Al-Turjman, F. M., Al-Fagih, A. E., Alsalih, W. M., & Hassanein, H. S. (2013). A delay-tolerant framework for integrated RSNs in IoT. Computer Communications, 36(9), 998–1010.
-
(2013)
A delay-tolerant framework for integrated RSNs in IoT. Computer Communications, 36(9), 998–1010
-
-
-
62
-
-
0142060789
-
Wireless sensor networks
-
Ren, F. Y., Huang, H. N., & Lin, C. (2003). Wireless sensor networks. Journal of Software,7, 1282–1290.
-
(2003)
Journal of Software
, vol.7
, pp. 1282-1290
-
-
Ren, F.Y.1
Huang, H.N.2
Lin, C.3
-
63
-
-
57449101619
-
Taxonomy and challenges of the integration of RFID and wireless sensor networks
-
Liu, H., Bolic, M., Nayak, A., & Stojmenovic, I. (2008). Taxonomy and challenges of the integration of RFID and wireless sensor networks. IEEE Network,22(6), 26–35.
-
(2008)
IEEE Network
, vol.22
, Issue.6
, pp. 26-35
-
-
Liu, H.1
Bolic, M.2
Nayak, A.3
Stojmenovic, I.4
-
64
-
-
25844435733
-
(2005). PIKE: Peer intermediaries for key establishment in sensor networks
-
Chan, H. W., & Perrig, A. (2005). PIKE: Peer intermediaries for key establishment in sensor networks. In IEEE Infocom 2005 (vol. 1, pp. 524–535).
-
(2005)
In IEEE Infocom
, vol.1
, pp. 524-535
-
-
Chan, H.W.1
Perrig, A.2
-
67
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
Perrigy, A., Canetti, R., Tygar, J. D., & Song, D. (2000). Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of 2000 IEEE symp on security and privacy (S&P 2000) (pp. 56–73).
-
(2000)
In Proceedings of 2000 IEEE symp on security and privacy (S&P
, vol.2000
, pp. 56-73
-
-
Perrigy, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
68
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., & Culler, D. E. (2002). SPINS: Security protocols for sensor networks. Wireless Networks,8(5), 521–534.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
69
-
-
33646812572
-
State of the art in ultra-low power public key cryptography for wireless sensor networks
-
Gaubatz, G., Kaps, J., Ozturk, E., & Sunar, B. (2005). State of the art in ultra-low power public key cryptography for wireless sensor networks. In Proceedings of the third IEEE international conference on pervasive computing and communications (pp. 146–150).
-
(2005)
In Proceedings of the third IEEE international conference on pervasive computing and communications
, pp. 146-150
-
-
Gaubatz, G.1
Kaps, J.2
Ozturk, E.3
Sunar, B.4
-
70
-
-
10044284351
-
LEAP: efficient security mechanisms for large-scale distributed sensor networks
-
Zhu, S. C., Setia, S., & Jajodia, S. (2003). LEAP: efficient security mechanisms for large-scale distributed sensor networks. In Proceeding of ACM CCS (pp. 62–72).
-
(2003)
In Proceeding of ACM CCS
, pp. 62-72
-
-
Zhu, S.C.1
Setia, S.2
Jajodia, S.3
-
71
-
-
84943243577
-
-
Pietro, R. D., Mancini, L. V., Law, Y. W., Etalle, S., & Havinga, P. J. M
-
Pietro, R. D., Mancini, L. V., Law, Y. W., Etalle, S., & Havinga, P. J. M. (2003). LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In Proceedings of the 32nd international conference on parallel processing workshops (ICPP) (pp. 397–406). IEEE Computer Society Press.
-
(2003)
LKHW: A directed diffusion-based secure multicast scheme for wireless sensor networks. In Proceedings of the 32nd international conference on parallel processing workshops (ICPP) (pp. 397–406). IEEE Computer Society Press
-
-
-
74
-
-
77955445503
-
Feedback: towards dynamic behavior and secure routing in wireless sensor networks
-
Cao, Z., Hu, J. B., Chen, Z., Xu, M. X., & Zhou, X. (2006). Feedback: towards dynamic behavior and secure routing in wireless sensor networks. In Proceedings of the IEEE workshop on pervasive computing and ad-hoc communication (PCAC’06) (vol. 2, pp. 160–164).
-
(2006)
In Proceedings of the IEEE workshop on pervasive computing and ad-hoc communication (PCAC’06)
, vol.2
, pp. 160-164
-
-
Cao, Z.1
Hu, J.B.2
Chen, Z.3
Xu, M.X.4
Zhou, X.5
-
75
-
-
0036793924
-
Denial of service in sensor networks
-
Wood, A. D., & Stankovic, J. A. (2002). Denial of service in sensor networks. IEEE Computer,35(10), 54–62.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
77
-
-
0041973497
-
(2003). Packet leashes: a defense against wormhole attacks in wireless networks
-
Hu, Y. C., Perrig, A., & Johnson, D. B. (2003). Packet leashes: a defense against wormhole attacks in wireless networks. In Twenty-second annual joint conference of the IEEE computer and communications, INFOCOM 2003 (vol. 3, pp. 1976–1987).
-
(2003)
In Twenty-second annual joint conference of the IEEE computer and communications, INFOCOM
, vol.3
, pp. 1976-1987
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
78
-
-
0003597249
-
Wormhole detection in wireless ad hoc networks. Department of Computer Science, Rice University, Tech. Rep
-
Hu, Y. C., Perrig, A., & Johnson, D. B. (2002). Wormhole detection in wireless ad hoc networks. Department of Computer Science, Rice University, Tech. Rep. TR01-384.
-
(2002)
TR01-384
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
82
-
-
41149110884
-
A security framework with trust management for sensor networks
-
Yao, Z. Y., Kim, D. Y., Lee, I., Kim, K. Y., & Jang, J. S. (2005). A security framework with trust management for sensor networks. In Proceeding of the IEEE workshop of the 1st international conference on security and privacy for emerging areas in communication networks (pp. 190–198).
-
(2005)
In Proceeding of the IEEE workshop of the 1st international conference on security and privacy for emerging areas in communication networks
, pp. 190-198
-
-
Yao, Z.Y.1
Kim, D.Y.2
Lee, I.3
Kim, K.Y.4
Jang, J.S.5
-
84
-
-
84910136399
-
-
KSW microtec AG. KSW—TempSens. Accessed 12 Oct 2013
-
KSW microtec AG. KSW—TempSens.http://www.ksw-microtec.de/www/doc/overviewtempsens1124436343en.pdf. Accessed 12 Oct 2013.
-
-
-
-
85
-
-
78649576455
-
Research on security management for internet of things
-
Wang, K., Bao, J., Wu, M., & Lu, W. (2010). Research on security management for internet of things. In Proceeding of the IEEE international conference on computer application and system modeling (ICCASM) (vol. 15, pp. 133–137).
-
(2010)
In Proceeding of the IEEE international conference on computer application and system modeling (ICCASM)
, vol.15
, pp. 133-137
-
-
Wang, K.1
Bao, J.2
Wu, M.3
Lu, W.4
-
88
-
-
34548344520
-
Phishing activity trends report
-
Anti-Phishing Working Group. (2009). Phishing activity trends report. Q42.
-
(2009)
Q42
-
-
-
89
-
-
84910149224
-
-
Tsinghua University Press, Beijing:
-
Liu, J., An, X. B., & Li, C. S. (2002). Wireless network communication principle and application (pp. 386–407). Beijing: Tsinghua University Press.
-
(2002)
Wireless network communication principle and application
, pp. 386-407
-
-
Liu, J.1
An, X.B.2
Li, C.S.3
-
90
-
-
84910123583
-
Ad hoc network and security analysis
-
Liu, Z. Y., & Yang, Z. C. (2006). Ad hoc network and security analysis. The Computer Technology and Development,16(1), 231.
-
(2006)
The Computer Technology and Development
, vol.16
, Issue.1
, pp. 231
-
-
Liu, Z.Y.1
Yang, Z.C.2
-
91
-
-
0037505358
-
DEAR: A device and energy aware routing protocol for heterogeneous Ad hoc networks
-
Avudainayagam, A., Lou, W., & Fang, Y. (2003). DEAR: A device and energy aware routing protocol for heterogeneous Ad hoc networks. Parallel and Distributed Computing,63(2), 228–236.
-
(2003)
Parallel and Distributed Computing
, vol.63
, Issue.2
, pp. 228-236
-
-
Avudainayagam, A.1
Lou, W.2
Fang, Y.3
-
92
-
-
0035245297
-
A new routing scheme concerning energy conservation in wireless home ad-hoc networks
-
Ryu, J. H., & Cho, D. H. (2001). A new routing scheme concerning energy conservation in wireless home ad-hoc networks. IEEE Transactions on Consumer Electronics,47(1), 1–5.
-
(2001)
IEEE Transactions on Consumer Electronics
, vol.47
, Issue.1
, pp. 1-5
-
-
Ryu, J.H.1
Cho, D.H.2
-
94
-
-
27944454417
-
Power and mobility-aware adaptive dynamic source routing in MANET. In Proceeding of
-
Li, X., Bao, Y. Z., & Zhen, Y. (2004). Power and mobility-aware adaptive dynamic source routing in MANET. In Proceeding of IEEE TENCON 2004 conference on analog and digital techniques in electrical engineering, (vol. B, vol. 2, pp. 652–655).
-
(2004)
IEEE TENCON 2004 conference on analog and digital techniques in electrical engineering, (vol. B
, vol.2
, pp. 652-655
-
-
Li, X.1
Bao, Y.Z.2
Zhen, Y.3
-
95
-
-
84880002406
-
A IoT security architecture for 3G access
-
Sun, Y. Y., Liu, Z. H., Li, Q., & Sun, L. M. (2010). A IoT security architecture for 3G access. Research and Development of the Computer,47, 327–332.
-
(2010)
Research and Development of the Computer
, vol.47
, pp. 327-332
-
-
Sun, Y.Y.1
Liu, Z.H.2
Li, Q.3
Sun, L.M.4
-
96
-
-
84910150610
-
Look the internet of things from the internet and 3G. Radio frequency (rf) in the world
-
Yang, Z. W. (2010). Look the internet of things from the internet and 3G. Radio frequency (rf) in the world, (01).
-
(2010)
(01)
-
-
Yang, Z.W.1
-
97
-
-
84910134311
-
Based on analysis of internet security of 3G networks
-
Xiong, Z. (2012). Based on analysis of internet security of 3G networks. Digital Technology and Application,3, 231.
-
(2012)
Digital Technology and Application
, vol.3
, pp. 231
-
-
Xiong, Z.1
-
98
-
-
84910144199
-
Based on the 3G internet security mechanism research
-
Sun, C. M., Sun, Y. P., & Zhou, J. (2005). Based on the 3G internet security mechanism research. Computer knowledge and technology, 7(31), 7632–7635.
-
(2005)
Computer knowledge and technology
, vol.7
, Issue.31
, pp. 7632-7635
-
-
Sun, C.M.1
Sun, Y.P.2
Zhou, J.3
-
99
-
-
84910125264
-
-
Jin, R. (2010). Discussion of 6LowPan technology. Accessed 12 Oct 2013
-
Jin, R. (2010). Discussion of 6LowPan technology.http://blog.csdn.net/rizejin/article/details/5548520. Accessed 12 Oct 2013.
-
-
-
-
100
-
-
84910134805
-
-
Montenegro, G., Kushalnagar, N., Hui, J., & Culler, D. (2007). Transmission of IPv6 packets over IEEE 802.15.4 networks. Accessed 12 Oct 2013
-
Montenegro, G., Kushalnagar, N., Hui, J., & Culler, D. (2007). Transmission of IPv6 packets over IEEE 802.15.4 networks.http://tools.ietf.org/html/rfc4944. Accessed 12 Oct 2013.
-
-
-
-
101
-
-
84910140629
-
-
Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007). IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals. Accessed 12 Oct 2013
-
Kushalnagar, N., Montenegro, G., & Schumacher, C. (2007). IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals.http://tools.ietf.org/html/rfc4919. Accessed 12 Oct 2013.
-
-
-
-
102
-
-
84857863999
-
-
Khoshdelniat, R., Sinniah, G., R., Bakar, K. A., Shahari, M. H. M., Suryady, Z., & Sarwar, U
-
Khoshdelniat, R., Sinniah, G., R., Bakar, K. A., Shahari, M. H. M., Suryady, Z., & Sarwar, U. Performance evaluation of IEEE802. 15.4 6LoWPAN gateway. In Proceeding of the IEEE Asia-Pacific conference on communications (APCC) (pp. 253–258).
-
Performance evaluation of IEEE802. 15.4 6LoWPAN gateway. In Proceeding of the IEEE Asia-Pacific conference on communications (APCC) (pp. 253–258)
-
-
-
104
-
-
84910123809
-
6lowpan adaptation layer network self-organizing ability of the simulation and research
-
Gu, J
-
Gu, J. (2008). 6lowpan adaptation layer network self-organizing ability of the simulation and research. Computer Applications and Software, 20(10), 42–45.
-
(2008)
Computer Applications and Software, 20(10), 42–45
-
-
-
106
-
-
79959280293
-
Internet of things: Applications and challenges in technology and standardization
-
Bandyopadhyay, D., & Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization. Wireless Personal Communications, 58(1), 49–69.
-
(2011)
Wireless Personal Communications
, vol.58
, Issue.1
, pp. 49-69
-
-
Bandyopadhyay, D.1
Sen, J.2
-
109
-
-
84910126742
-
Massive internet data security processing model research
-
Zhang, G. G., Bi, Y., & Li, C., et al. (2013). Massive internet data security processing model research. Small Microcomputer System, 34(9), 2090–2094.
-
(2013)
Small Microcomputer System
, vol.34
, Issue.9
, pp. 2090-2094
-
-
Zhang, G.G.1
Bi, Y.2
Li, C.3
-
111
-
-
0036811662
-
K-anonymity: A model for protecting privacy
-
Sweeney, L. (2002). K-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems,5, 557–570.
-
(2002)
International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems
, vol.5
, pp. 557-570
-
-
Sweeney, L.1
-
112
-
-
84910144333
-
-
A. de Saint-Exupery. Internet of things [EB/OL]. Accessed 12 Oct 2013
-
A. de Saint-Exupery. Internet of things [EB/OL]. http://www.sintef.no/upload/IKT/9022/CERP-IoT%20SRA_IoT_vll_pdf.pf. Accessed 12 Oct 2013.
-
-
-
-
113
-
-
34248219805
-
Research on China internet of things’ services and management
-
Sheng, N. H., Yu, Z., Li, L. F., Ming, L. W., & Feng, Q. S. (2006). Research on China internet of things’ services and management. Chinese of Journal Electronics,34(12A), 2514–2517.
-
(2006)
Chinese of Journal Electronics
, vol.34
, Issue.12A
, pp. 2514-2517
-
-
Sheng, N.H.1
Yu, Z.2
Li, L.F.3
Ming, L.W.4
Feng, Q.S.5
-
114
-
-
79952068013
-
TASA: Tag-free activity sensing using RFID tag arrays
-
Zhang, D., Zhou, J., Guo, M., Cao, J., & Li, T. (2011). TASA: Tag-free activity sensing using RFID tag arrays. IEEE Transactions on Parallel and Distributed Systems, 22(4), 558–570.
-
(2011)
IEEE Transactions on Parallel and Distributed Systems
, vol.22
, Issue.4
, pp. 558-570
-
-
Zhang, D.1
Zhou, J.2
Guo, M.3
Cao, J.4
Li, T.5
-
115
-
-
84910145564
-
Logistics monitoring design based on ZigBee technology
-
Gu, D. C., Chen, L., & Zhang, Z. Q. (2013). Logistics monitoring design based on ZigBee technology. The Internet of Things Technology,2, 79–86.
-
(2013)
The Internet of Things Technology
, vol.2
, pp. 79-86
-
-
Gu, D.C.1
Chen, L.2
Zhang, Z.Q.3
-
116
-
-
84875896783
-
-
Beijing University of Aeronautics and Astronautics Press, Beijing:
-
Zai, L., Liu, S. D., & Hu, X. B. (2007). ZigBee technology and application (p. 2007). Beijing: Beijing University of Aeronautics and Astronautics Press.
-
(2007)
ZigBee technology and application
, pp. 2007
-
-
Zai, L.1
Liu, S.D.2
Hu, X.B.3
-
117
-
-
84882987639
-
Smart home system research for the mobile internet
-
Shao, P. F., Wang, Z., & Zhang, B. R. (2012). Smart home system research for the mobile internet. The Computer Measurement and Control,20(2), 474–476.
-
(2012)
The Computer Measurement and Control
, vol.20
, Issue.2
, pp. 474-476
-
-
Shao, P.F.1
Wang, Z.2
Zhang, B.R.3
-
118
-
-
84894170460
-
A survey of recent developments in home M2 M networks
-
Chen, M., Wan, J., González, S., Liao, X., & Leung, V. (2014). A survey of recent developments in home M2 M networks. IEEE Communications Surveys and Tutorials,16(1), 98–114.
-
(2014)
IEEE Communications Surveys and Tutorials
, vol.16
, Issue.1
, pp. 98-114
-
-
Chen, M.1
Wan, J.2
González, S.3
Liao, X.4
Leung, V.5
-
119
-
-
84910114990
-
The internet of things technology in the application of the smart home
-
Chen, Y. P. (2013). The internet of things technology in the application of the smart home. China Public Security,16, 61–63.
-
(2013)
China Public Security
, vol.16
, pp. 61-63
-
-
Chen, Y.P.1
-
120
-
-
84910131940
-
The smart home system based on internet of things technology research and discussion
-
Bao, Y. Q. (2013). The smart home system based on internet of things technology research and discussion. The Internet of Things Technology,7, 38–41.
-
(2013)
The Internet of Things Technology
, vol.7
, pp. 38-41
-
-
Bao, Y.Q.1
|