-
1
-
-
84876783313
-
Lightweight Sybil attack detection in MANETs
-
S Abbas, M Merabti, D Llewellyn-Jones, and K Kifayat Lightweight Sybil attack detection in MANETs IEEE Syst J 7 2 2013 236 248 10.1109/JSYST.2012.2221912
-
(2013)
IEEE Syst J
, vol.7
, Issue.2
, pp. 236-248
-
-
Abbas, S.1
Merabti, M.2
Llewellyn-Jones, D.3
Kifayat, K.4
-
2
-
-
84883725153
-
Low power link layer security for IoT: Implementation and performance analysis
-
Altolini D, Lakkundi V, Bui N, Tapparello C, Rossi M. Low power link layer security for IoT: implementation and performance analysis. In: Proceedings of the 9th international wireless communications and mobile computing conference, IWCMC 2013. Sardinia (Italy): Institute of Electrical and Electronics Engineers; July 2013. p. 919-25.
-
(2013)
Proceedings of the 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013. Sardinia (Italy): Institute of Electrical and Electronics Engineers; July
, pp. 919-925
-
-
Altolini, D.1
Lakkundi, V.2
Bui, N.3
Tapparello, C.4
Rossi, M.5
-
3
-
-
0035120939
-
Toward self-healing energy infrastructure systems
-
M Amin Toward self-healing energy infrastructure systems IEEE Comput Appl Power 14 1 2002 20 28 10.1109/67.893351
-
(2002)
IEEE Comput Appl Power
, vol.14
, Issue.1
, pp. 20-28
-
-
Amin, M.1
-
5
-
-
84920197756
-
SIHAT: Simplifying interfaces in health-nets for achieving telemetry
-
Qazi Muhammad Adnan Hye, Pak Publishing Group Pakistan
-
Q.M. Ashraf, M.H. Habaebi, and J. Chebil SIHAT: simplifying interfaces in health-nets for achieving telemetry Qazi Muhammad Adnan Hye, Handbook on the emerging trends in scientific research 2014 Pak Publishing Group Pakistan 207 217
-
(2014)
Handbook on the Emerging Trends in Scientific Research
, pp. 207-217
-
-
Ashraf, Q.M.1
Habaebi, M.H.2
Chebil, J.3
-
6
-
-
84906689557
-
Autonomic protocol and architecture for devices in Internet of Things
-
Kuala Lumpur (Malaysia): Institute of Electrical and Electronics Engineers
-
Ashraf QM, Habaebi MH, Sinniah GR, Ahmed MM, Khan S, Hameed S. Autonomic protocol and architecture for devices in Internet of Things. In: Proceedings of IEEE innovative smart grid technologies - Asia, ISGT Asia 2014. Kuala Lumpur (Malaysia): Institute of Electrical and Electronics Engineers; 2014b. p. 737-42.
-
(2014)
Proceedings of IEEE Innovative Smart Grid Technologies - Asia, ISGT Asia 2014
, pp. 737-742
-
-
Ashraf, Q.M.1
Habaebi, M.H.2
Sinniah, G.R.3
Ahmed, M.M.4
Khan, S.5
Hameed, S.6
-
7
-
-
84906713670
-
Broadcast based registration technique for heterogenous nodes in the IoT
-
Ashraf QM, Habaebi MH, Sinniah GR, Chebil J. Broadcast based registration technique for heterogenous nodes in the IoT. In: Proceedings engineering & technology, PET 2014. Sousse (Tunisia): International Publisher & C.O; 2014c. p. 45-50.
-
(2014)
Proceedings Engineering & Technology, PET 2014. Sousse (Tunisia): International Publisher & C.O
, pp. 45-50
-
-
Ashraf, Q.M.1
Habaebi, M.H.2
Sinniah, G.R.3
Chebil, J.4
-
8
-
-
70350029963
-
The self-star vision
-
Ozalp Babaoglu, Márk Jelasity, Alberto Montresor, Christof Fetzer, Stefano Leonardi, Aad van Moorsel, Maarten van Steen (Eds.)
-
Babaoglu O, Jelasity M, Montresor A, Fetzer C, Leonardi S, van Moorsel A. et al. The self-star vision. Ozalp Babaoglu, Márk Jelasity, Alberto Montresor, Christof Fetzer, Stefano Leonardi, Aad van Moorsel, Maarten van Steen (Eds.) In: Self-star properties in complex information systems. Berlin Heidelberg: Springer, 10.1007/11428589-1; 2005. p. 1-20.
-
(2005)
Self-star Properties in Complex Information Systems. Berlin Heidelberg: Springer
, pp. 1-20
-
-
Babaoglu, O.1
Jelasity, M.2
Montresor, A.3
Fetzer, C.4
Leonardi, S.5
Van Moorsel, A.6
-
9
-
-
79960904737
-
Proposed embedded security framework for Internet of Things (IoT)
-
Chennai (India): Institute of Electrical and Electronics Engineers
-
Babar S, Stango A, Prasad N, Sen J, Prasad R. Proposed embedded security framework for Internet of Things (IoT). In: Proceedings of 2nd international conference on wireless communication, vehicular technology, information theory and aerospace & electronic systems technology, wireless VITAE 2011. Chennai (India): Institute of Electrical and Electronics Engineers, 10.1109/WIRELESSVITAE.2011.5940923; 2011. p. 1-5.
-
(2011)
Proceedings of 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Wireless VITAE 2011
, pp. 1-5
-
-
Babar, S.1
Stango, A.2
Prasad, N.3
Sen, J.4
Prasad, R.5
-
10
-
-
34047126869
-
Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards
-
P Baronti, P Pillai, VWC Chook, S Chessa, A Gotta, and YF. Hu Wireless sensor networks: a survey on the state of the art and the 802.15.4 and ZigBee standards Comput Commun 30 7 2007 1655 1695 10.1016/j.comcom.2006.12.020
-
(2007)
Comput Commun
, vol.30
, Issue.7
, pp. 1655-1695
-
-
Baronti, P.1
Pillai, P.2
Chook, V.W.C.3
Chessa, S.4
Gotta, A.5
Hu, Y.F.6
-
11
-
-
84901475866
-
Monitoring in mobile ad hoc networks: A survey
-
N Battat, H Seba, and H. Kheddouci Monitoring in mobile ad hoc networks: a survey Comput Netw 69 2014 82 100 10.1016/j.comnet.2014.04.013
-
(2014)
Comput Netw
, vol.69
, pp. 82-100
-
-
Battat, N.1
Seba, H.2
Kheddouci, H.3
-
14
-
-
84888012453
-
Joint reactive jammer detection and localization in an enterprise WiFi network
-
Y Cai, K Pelechrinis, X Wang, P Krishnamurthy, and Y. Mo Joint reactive jammer detection and localization in an enterprise WiFi network Comput Netw 57 18 2013 3799 3811 10.1016/j.comnet.2013.09.004
-
(2013)
Comput Netw
, vol.57
, Issue.18
, pp. 3799-3811
-
-
Cai, Y.1
Pelechrinis, K.2
Wang, X.3
Krishnamurthy, P.4
Mo, Y.5
-
15
-
-
84893187027
-
Toward an automatic, havioral malware classification system
-
Canzanese R, Kam M, Mancoridis S. Toward an automatic, havioral malware classification system. In: Proceedings of the 7th international conference on self-adaptive and self-organizing systems, SASO 2013. Philadelphia (United States of America): Institute of Electrical and Electronics Engineers, 10.1109/SASO.2013.8; 2013. p. 111-20.
-
(2013)
Proceedings of the 7th International Conference on Self-adaptive and Self-organizing Systems, SASO 2013. Philadelphia (United States of America): Institute of Electrical and Electronics Engineers
, pp. 111-120
-
-
Canzanese, R.1
Kam, M.2
Mancoridis, S.3
-
16
-
-
84920112677
-
Detection and mitigation of MITM attacks in storage cloud infrastructures
-
J Carmilema, MA Medrano, and D. Flores Detection and mitigation of MITM attacks in storage cloud infrastructures Rev Digit Cient Technol 1 2012 26 30
-
(2012)
Rev Digit Cient Technol
, vol.1
, pp. 26-30
-
-
Carmilema, J.1
Medrano, M.A.2
Flores, D.3
-
18
-
-
80455141504
-
A novel secure architecture for the Internet of Things
-
Chen D, Chang G, Jin L, Ren X, Li J, Li F. A novel secure architecture for the Internet of Things. In: Proceedings of fifth international conference on genetic and evolutionary computing, ICGEC 2011. Xiamen (China): Institute of Electrical and Electronics Engineers, doi:10.1109/ICGEC.2011.77; 2011. p. 311-14.
-
(2011)
Proceedings of Fifth International Conference on Genetic and Evolutionary Computing, ICGEC 2011. Xiamen (China): Institute of Electrical and Electronics Engineers
, pp. 311-314
-
-
Chen, D.1
Chang, G.2
Jin, L.3
Ren, X.4
Li, J.5
Li, F.6
-
20
-
-
77951465668
-
A sinkhole attack detection mechanism for LQI based mesh routing in WSN
-
Choi BG, Cho EJ, Kim JH, Hong CS, Kim JH. A sinkhole attack detection mechanism for LQI based mesh routing in WSN. In: Proceedings of the international conference on information networking, ICOIN 2009. Chiang Mai(Thailand): Institute of Electrical and Electronics Engineers; 2009. p. 1-5.
-
(2009)
Proceedings of the International Conference on Information Networking, ICOIN 2009. Chiang Mai(Thailand): Institute of Electrical and Electronics Engineers
, pp. 1-5
-
-
Choi, B.G.1
Cho, E.J.2
Kim, J.H.3
Hong, C.S.4
Kim, J.H.5
-
21
-
-
80755141545
-
Privacy aware systems: From models to patterns
-
Mouratidis Haralambos, IGI Global, University of East London UK
-
A. Coen-Porisini, P. Colombo, and S. Sicari Privacy aware systems: from models to patterns Mouratidis Haralambos, Software Engineering for Secure Systems: Industrial and Research Perspectives. 2010 IGI Global, University of East London UK 232 259 10.4018/978-1-61520-837-1.ch009
-
(2010)
Software Engineering for Secure Systems: Industrial and Research Perspectives.
, pp. 232-259
-
-
Coen-Porisini, A.1
Colombo, P.2
Sicari, S.3
-
22
-
-
0003247337
-
Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations [Internet]
-
[cited 2014 Sep 14]. Available from
-
Corson S, Macker J. Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations [Internet]. Internet Engineering Task Force; 1999 [cited 2014 Sep 14]. Available from 〈http://tools.ietf.org/html/rfc2501〉.
-
(1999)
Internet Engineering Task Force
-
-
Corson, S.1
Macker, J.2
-
23
-
-
84884231488
-
On eavesdropping attacks in wireless sensor networks with directional antennas
-
HN Dai, Q Wang, D Li, and RCW Wong On eavesdropping attacks in wireless sensor networks with directional antennas Int J Distrib Sens Netw 2013 2013 1 13 10.1155/2013/760834
-
(2013)
Int J Distrib Sens Netw
, vol.2013
, pp. 1-13
-
-
Dai, H.N.1
Wang, Q.2
Li, D.3
Wong, R.C.W.4
-
25
-
-
70449718997
-
Selective forwarding attack detection using watermark in WSNs
-
Deng H, Sun X, Wang B, Cao Y. Selective forwarding attack detection using watermark in WSNs. In: Proceedings of ISECS international colloquium on computing, communication, control and management, CCCM 2009. Sanya(China): Institute of Electrical and Electronics Engineers, 10.1109/CCCM.2009.5268016; 2009. p. 109-13.
-
(2009)
Proceedings of ISECS International Colloquium on Computing, Communication, Control and Management, CCCM 2009. Sanya(China): Institute of Electrical and Electronics Engineers
, pp. 109-113
-
-
Deng, H.1
Sun, X.2
Wang, B.3
Cao, Y.4
-
26
-
-
58149086240
-
POSH: Proactive co-operative self-healing in unattended wireless sensor networks
-
Naples(Italy): Institute of Electrical and Electronics Engineers
-
Di Pietro R, Ma D, Soriente C, Tsudik G. POSH: Proactive co-operative self-healing in unattended wireless sensor networks. In: Proceedings of IEEE symposium on reliable distributed system, SRDS 2008. Naples(Italy): Institute of Electrical and Electronics Engineers, 10.1109/SRDS.2008.23; 2008. p. 185-94.
-
(2008)
Proceedings of IEEE Symposium on Reliable Distributed System, SRDS 2008
, pp. 185-194
-
-
Di Pietro, R.1
Ma, D.2
Soriente, C.3
Tsudik, G.4
-
27
-
-
70449419951
-
Data security in unattended wireless sensor networks
-
R Di Pietro, LV Mancini, C Soriente, A Spognardi, and G Tsudik Data security in unattended wireless sensor networks IEEE Trans Comput 58 11 2009 1500 1511 10.1109/TC.2009.109
-
(2009)
IEEE Trans Comput
, vol.58
, Issue.11
, pp. 1500-1511
-
-
Di Pietro, R.1
Mancini, L.V.2
Soriente, C.3
Spognardi, A.4
Tsudik, G.5
-
29
-
-
38549139180
-
Constant storage self-healing key distribution with revocation in wireless sensor network
-
Glasgow(Scotland): Institute of Electrical and Electronics Engineers
-
Dutta R, Dong Wu Y, Mukhopadhyay S. Constant storage self-healing key distribution with revocation in wireless sensor network. In: Proceedings of IEEE international conference on communications, ICC 2007. Glasgow(Scotland): Institute of Electrical and Electronics Engineers, 10.1109/ICC.2007.223; 2007. 1323-28.
-
(2007)
Proceedings of IEEE International Conference on Communications, ICC 2007
, pp. 1323-1328
-
-
Dutta, R.1
Dong Wu, Y.2
Mukhopadhyay, S.3
-
30
-
-
84873739593
-
A survey of energy-efficient wireless communications
-
D Feng, C Jiang, G Lim, LJ Cimini Jr, G Feng, and GY Li A survey of energy-efficient wireless communications IEEE Commun Surv Tutor 15 1 2013 167 178 10.1109/SURV.2012.020212.00049
-
(2013)
IEEE Commun Surv Tutor
, vol.15
, Issue.1
, pp. 167-178
-
-
Feng, D.1
Jiang, C.2
Lim, G.3
Cimini, Jr.L.J.4
Feng, G.5
Li, G.Y.6
-
34
-
-
33845710890
-
Self-healing systems-survey and synthesis
-
D Ghosh, R Sharman, H Raghav Rao, and S Upadhyaya Self-healing systems-survey and synthesis Decis Support Syst 42 4 2007 2164 2185 10.1016/j.dss.2006.06.011
-
(2007)
Decis Support Syst
, vol.42
, Issue.4
, pp. 2164-2185
-
-
Ghosh, D.1
Sharman, R.2
Raghav Rao, H.3
Upadhyaya, S.4
-
35
-
-
81355147383
-
A survey on facilities for experimental internet of things research
-
A Gluhak, S Krco, M Nati, D Pfisterer, N Mitton, and T Razafindralambo A survey on facilities for experimental internet of things research IEEE Commun Mag 49 11 2011 58 67 10.1109/MCOM.2011.6069710
-
(2011)
IEEE Commun Mag
, vol.49
, Issue.11
, pp. 58-67
-
-
Gluhak, A.1
Krco, S.2
Nati, M.3
Pfisterer, D.4
Mitton, N.5
Razafindralambo, T.6
-
36
-
-
85027949525
-
A survey of broadcast authentication schemes for wireless sensor networks
-
K Grover, and A Lim A survey of broadcast authentication schemes for wireless sensor networks Ad Hoc Netw 24(A) 2015 288 316 10.1016/j.adhoc.2014.06.008
-
(2015)
Ad Hoc Netw
, vol.24 A
, pp. 288-316
-
-
Grover, K.1
Lim, A.2
-
37
-
-
84902106352
-
Trust management mechanism for Internet of Things
-
L Gu, J Wang, and B Sun Trust management mechanism for Internet of Things Ch Commun 11 2 2014 148 156 10.1109/CC.2014.6821746
-
(2014)
Ch Commun
, vol.11
, Issue.2
, pp. 148-156
-
-
Gu, L.1
Wang, J.2
Sun, B.3
-
38
-
-
84876943063
-
Internet of Things (IoT): A vision, architectural elements, and future directions
-
J Gubbi, R Buyya, S Marusic, and M Palaniswami Internet of Things (IoT): a vision, architectural elements, and future directions Future Gener Comput Syst 29 7 2013 1645 1660 10.1016/j.future.2013.01.010
-
(2013)
Future Gener Comput Syst
, vol.29
, Issue.7
, pp. 1645-1660
-
-
Gubbi, J.1
Buyya, R.2
Marusic, S.3
Palaniswami, M.4
-
41
-
-
84927518156
-
Trust-based decision-making for energy-aware device management
-
Dimitrova Vania, Kuflik Tsvi, Chin David, Ricci Francesco, Dolog Peter, Houben Geert-Jan, Springer International Publishing Switzerland
-
S. Hammer, M. Wißner, and E. André Trust-based decision-making for energy-aware device management Dimitrova Vania, Kuflik Tsvi, Chin David, Ricci Francesco, Dolog Peter, Houben Geert-Jan, User modeling, adaptation, and personalization 2014 Springer International Publishing Switzerland 326 337 10.1007/978-3-319-08786-3-29
-
(2014)
User Modeling, Adaptation, and Personalization
, pp. 326-337
-
-
Hammer, S.1
Wißner, M.2
André, E.3
-
42
-
-
65949120002
-
Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks
-
S Han, B Tian, M He, and E Chang Efficient threshold self-healing key distribution with sponsorization for infrastructureless wireless networks IEEE Trans Wirel Commun 8 4 2009 1876 1887 10.1109/TWC.2009.080046
-
(2009)
IEEE Trans Wirel Commun
, vol.8
, Issue.4
, pp. 1876-1887
-
-
Han, S.1
Tian, B.2
He, M.3
Chang, E.4
-
44
-
-
84920121658
-
-
Internet Engineering Task Force [cited 2014 Sep 10]. Available from
-
Hartke K, Bergmann O. DTLS In constrained environments (DICE) [Internet]. Internet Engineering Task Force; 2013 [cited 2014 Sep 10]. Available from: 〈http://www.ietf.org/proceedings/83/slides/slides-83-lwig-2.pdf〉.
-
(2013)
DTLS in Constrained Environments (DICE) [Internet]
-
-
Hartke, K.1
Bergmann, O.2
-
45
-
-
84863512174
-
ReTrust: Attack-resistant and lightweight trust management for medical sensor networks
-
D He, C Chen, S Chan, J Bu, and AV Vasilakos ReTrust: attack-resistant and lightweight trust management for medical sensor networks IEEE Trans Inf Technol Biomed 16 4 2012 623 632 10.1109/TITB.2012.2194788
-
(2012)
IEEE Trans Inf Technol Biomed
, vol.16
, Issue.4
, pp. 623-632
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
Vasilakos, A.V.5
-
46
-
-
35048847641
-
Tackling security and privacy issues in radio frequency identification devices
-
Ferscha Alois, Mattern Friedemann, Berlin Heidelberg Springer
-
D. Henrici, and P. Müller Tackling security and privacy issues in radio frequency identification devices Ferscha Alois, Mattern Friedemann, Pervasive computing 2004 Berlin Heidelberg Springer 219 224 10.1007/978-3-540-24646-6-16
-
(2004)
Pervasive Computing
, pp. 219-224
-
-
Henrici, D.1
Müller, P.2
-
48
-
-
42449088961
-
A survey of autonomic computing-degrees, models, and applications
-
MC Huebscher, and JA McCann A survey of autonomic computing-degrees, models, and applications ACM Comput Surv 40 3 2008 2 28 10.1145/1380584.1380585
-
(2008)
ACM Comput Surv
, vol.40
, Issue.3
, pp. 2-28
-
-
Huebscher, M.C.1
McCann, J.A.2
-
49
-
-
78650903822
-
Internet of Things
-
A Iera, C Floerkemeier, J Mitsugi, and G Morabito Internet of Things IEEE Wirel Commun 17 6 2010 8 9 10.1109/MWC.2010.5675772
-
(2010)
IEEE Wirel Commun
, vol.17
, Issue.6
, pp. 8-9
-
-
Iera, A.1
Floerkemeier, C.2
Mitsugi, J.3
Morabito, G.4
-
50
-
-
0343770530
-
Autonomic nervous system
-
Schmidt Robert F., Thews Gerhrad, Berlin Heidelberg Springer
-
W. Jänig Autonomic nervous system Schmidt Robert F., Thews Gerhrad, Human physiology 1989 Berlin Heidelberg Springer 333 370
-
(1989)
Human Physiology
, pp. 333-370
-
-
Jänig, W.1
-
51
-
-
23944476196
-
Minimalist cryptography for low-cost RFID tags
-
Blundo Carlo, Cimato Stelvio, Springer Berlin Heidelberg
-
A. Juels Minimalist cryptography for low-cost RFID tags Blundo Carlo, Cimato Stelvio, Security in communication networks 2005 Springer Berlin Heidelberg 149 164 10.1007/978-3-540-30598-9-11
-
(2005)
Security in Communication Networks
, pp. 149-164
-
-
Juels, A.1
-
53
-
-
50949085110
-
Addressing privacy requirements in system design: The pris method
-
C Kalloniatis, E Kavakli, and S Gritzalis Addressing privacy requirements in system design: the pris method Requir Eng 13 3 2008 241 255 10.1007/s00766-008-0067-3
-
(2008)
Requir Eng
, vol.13
, Issue.3
, pp. 241-255
-
-
Kalloniatis, C.1
Kavakli, E.2
Gritzalis, S.3
-
54
-
-
85008244129
-
A survey of security mechanisms with direct sequence spread spectrum signals
-
T Kang, X Li, C Yu, and J Kim A survey of security mechanisms with direct sequence spread spectrum signals J Comput Sci Eng 7 3 2013 187 197 10.5626/JCSE.2013.7.3.187
-
(2013)
J Comput Sci Eng
, vol.7
, Issue.3
, pp. 187-197
-
-
Kang, T.1
Li, X.2
Yu, C.3
Kim, J.4
-
56
-
-
0037253062
-
The vision of autonomic computing
-
JO Kephart, and DM Chess The vision of autonomic computing Computer 36 1 2003 41 50 10.1109/MC.2003.1160055
-
(2003)
Computer
, vol.36
, Issue.1
, pp. 41-50
-
-
Kephart, J.O.1
Chess, D.M.2
-
58
-
-
57849148091
-
CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks
-
Kim YK, Lee H, Cho K, Lee DH. CADE: Cumulative acknowledgement based detection of selective forwarding attacks in wireless sensor networks. In: Proceedings of third international conference on convergenece and hybrid information technology, ICCIT 2008. Busan(South Korea): Institute of Electrical and Electronics Engineers, 10.1109/ICCIT.2008.271; 2008. 416-22.
-
(2008)
Proceedings of Third International Conference on Convergenece and Hybrid Information Technology, ICCIT 2008. Busan(South Korea): Institute of Electrical and Electronics Engineers
, pp. 416-422
-
-
Kim, Y.K.1
Lee, H.2
Cho, K.3
Lee, D.H.4
-
61
-
-
84885304488
-
DTLS based security and two-way authentication for the Internet of Things
-
T Kothmayr, C Schmitt, W Hu, M Brünig, and G Carle DTLS based security and two-way authentication for the Internet of Things Ad Hoc Netw 11 8 2013 2710 2723 10.1016/j.adhoc.2013.05.003
-
(2013)
Ad Hoc Netw
, vol.11
, Issue.8
, pp. 2710-2723
-
-
Kothmayr, T.1
Schmitt, C.2
Hu, W.3
Brünig, M.4
Carle, G.5
-
62
-
-
49949111918
-
Intrusion detection of sinkhole attacks in wireless sensor networks
-
Kutylowski Miroslaw, Cichon Jacek, Kubiak Przemyslaw, Springer Berlin Heidelberg
-
I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos Intrusion detection of sinkhole attacks in wireless sensor networks Kutylowski Miroslaw, Cichon Jacek, Kubiak Przemyslaw, Algorithmic aspects of wireless sensor networks 2008 Springer Berlin Heidelberg 150 161 10.1007/978-3-540-77871-4-14
-
(2008)
Algorithmic Aspects of Wireless Sensor Networks
, pp. 150-161
-
-
Krontiris, I.1
Dimitriou, T.2
Giannetsos, T.3
Mpasoukos, M.4
-
63
-
-
84930759603
-
-
[Internet]. Internet Engineering Task Force [cited 2014 Sep 7]. Available from
-
Kumar S. Group communication security for low-power and lossy networks (LLNs) [Internet]. Internet Engineering Task Force; 2014 [cited 2014 Sep 7]. Available from: 〈https://datatracker.ietf.org/doc/draft-kumar-dice-groupcomm-security/〉.
-
(2014)
Group Communication Security for Low-power and Lossy Networks (LLNs)
-
-
Kumar, S.1
-
64
-
-
51249107460
-
-
[Internet]. Internet Engineering Task Force [cited 2014 Aug 2]. Available from
-
Kushalnagar N, Montenegro G, Schumacher C. IPv6 over low-power wireless personal area networks (6LoWPANs): Overview, assumptions, problem statement, and goals [Internet]. Internet Engineering Task Force; 2007 [cited 2014 Aug 2]. Available from 〈http://tools.ietf.org/html/rfc4919〉.
-
(2007)
IPv6 over Low-power Wireless Personal Area Networks (6LoWPANs): Overview, Assumptions, Problem Statement, and Goals
-
-
Kushalnagar, N.1
Montenegro, G.2
Schumacher, C.3
-
65
-
-
84890106421
-
Future of autonomic computing and conclusions
-
Lalanda Philippe, McCann Julie A, Diaconescu Ada, Springer London
-
P. Lalanda, J.A. McCann, and A. Diaconescu Future of autonomic computing and conclusions Lalanda Philippe, McCann Julie A, Diaconescu Ada, Autonomic computing: principles, design and implementation 2013 Springer London 263 278 10.1007/978-1-4471-5007-7-10
-
(2013)
Autonomic Computing: Principles, Design and Implementation
, pp. 263-278
-
-
Lalanda, P.1
McCann, J.A.2
Diaconescu, A.3
-
67
-
-
84902197946
-
LSR: Mitigating zero-day Sybil vulnerability in privacy-preserving vehicular peer-to-peer networks
-
X Lin LSR: mitigating zero-day Sybil vulnerability in privacy-preserving vehicular peer-to-peer networks IEEE J Sel Areas Commun 31 9 2013 237 246 10.1109/JSAC.2013.SUP.0513021
-
(2013)
IEEE J Sel Areas Commun
, vol.31
, Issue.9
, pp. 237-246
-
-
Lin, X.1
-
68
-
-
46149085886
-
A proxy for privacy: The discreet box
-
Warsaw(Poland): Institute of Electrical and Electronics Engineers
-
Lioudakis GV, Koutsoloukas EA, Dellas N, Kapellaki S, Prezerakos GN, Kaklamani DI et al. A proxy for privacy: the discreet box. In: Proceedings of the international conference on computer as a tool, EUROCON 2008. Warsaw(Poland): Institute of Electrical and Electronics Engineers, 10.1109/EURCON.2007.4400521; 2007. 966-73.
-
(2007)
Proceedings of the International Conference on Computer As A Tool, EUROCon 2008
, pp. 966-973
-
-
Lioudakis, G.V.1
Koutsoloukas, E.A.2
Dellas, N.3
Kapellaki, S.4
Prezerakos, G.N.5
Kaklamani, D.I.6
-
69
-
-
84866349735
-
Authenctication and access control in the Internet of Things
-
Fàbrega Lluís, Vilà Pere, Careglio Davide, Papadimitriou Dimitri, Institute of Electrical and Electronics Engineers Macau(China)
-
J. Liu, Y. Xiao, and C.L.P. Chen Authenctication and access control in the Internet of Things Fàbrega Lluís, Vilà Pere, Careglio Davide, Papadimitriou Dimitri, Proceedings of 32nd international conference on distributed computing systems workshops, ICDCSW 2012 Institute of Electrical and Electronics Engineers Macau(China) 588 592 10.1109/ICDCSW.2012.23
-
(2012)
Proceedings of 32nd International Conference on Distributed Computing Systems Workshops, ICDCSW
, pp. 588-592
-
-
Liu, J.1
Xiao, Y.2
Chen, C.L.P.3
-
70
-
-
84885737859
-
Various detection techniques and platforms for monitoring interference condition in a wireless testbed
-
Liu W, Keranidis S, Mehari M, Vanhie-Van Gerwen J, Bouckaert S, Yaron O, Moerman I. Various detection techniques and platforms for monitoring interference condition in a wireless testbed. In: Measurement methodology and tools. Berlin Heidelberg: Springer, 10.1007/978-3-642-41296-7-4; 2013. p. 43-60.
-
(2013)
Measurement Methodology and Tools. Berlin Heidelberg: Springer, 10.1007/978-3-642-41296-7-4
, pp. 43-60
-
-
Liu, W.1
Keranidis, S.2
Mehari, M.3
Vanhie-Van Gerwen, J.4
Bouckaert, S.5
Yaron, O.6
Moerman, I.7
-
71
-
-
77955405219
-
Wireless jamming localization by exploiting nodes' hearing ranges
-
Rajmohan Rajaraman, Thoma, s Moscibroda, Adam Dunkels, Anna Scaglione (Eds.)
-
Liu Z, Liu H, Xu W, Chen Y. Wireless jamming localization by exploiting nodes' hearing ranges. Rajmohan Rajaraman, Thoma, s Moscibroda, Adam Dunkels, Anna Scaglione (Eds.) In: Distributed computing in sensor systems. Berlin Heidelberg: Springer, 10.1007/978-3-642-13651-1-25; 2010. p. 348-61.
-
(2010)
Distributed Computing in Sensor Systems. Berlin Heidelberg: Springer
, pp. 348-361
-
-
Liu, Z.1
Liu, H.2
Xu, W.3
Chen, Y.4
-
72
-
-
84920148551
-
-
International Business Machines Corporation (IBM) [cited 2014 Aug 14] Available from
-
Locke D. MQTT V3.1 Protocol Specification [Internet]. International Business Machines Corporation (IBM); 2011. [cited 2014 Aug 14] Available from: 〈http://www.ibm.com/developerworks/library/ws-mqtt/〉.
-
(2011)
MQTT V3.1 Protocol Specification [Internet]
-
-
Locke, D.1
-
74
-
-
84911911656
-
Threshold cryptography-based group authentication (TCGA) scheme for the Internet of Things
-
Mahalle PN, Prasad NR, Prasad R. Threshold cryptography-based group authentication (TCGA) scheme for the Internet of Things. In: Proceedings of the 4th international conference on wireless communicatons, vehicular technology, information theory and aerospace & electronic systems, VITAE 2014. Aalborg (Denmark): Institute of Electrical and Electronics Engineers, 10.1109/VITAE.2014.6934425; 2014. 1-5.
-
(2014)
Proceedings of the 4th International Conference on Wireless Communicatons, Vehicular Technology, Information Theory and Aerospace & Electronic Systems, VITAE 2014. Aalborg (Denmark): Institute of Electrical and Electronics Engineers
, pp. 1-5
-
-
Mahalle, P.N.1
Prasad, N.R.2
Prasad, R.3
-
76
-
-
79952824469
-
Low energy symmetric key distribution in wireless sensor networks
-
K McCusker, and NE O'Connor Low energy symmetric key distribution in wireless sensor networks IEEE Trans Depend Secur Comput 8 3 2011 363 376 10.1109/TDSC.2010.73
-
(2011)
IEEE Trans Depend Secur Comput
, vol.8
, Issue.3
, pp. 363-376
-
-
McCusker, K.1
O'Connor, N.E.2
-
77
-
-
1142301940
-
Authentication and its privacy effects
-
LI Millett, and SH Holden Authentication and its privacy effects IEEE Internet Comput 7 6 2003 54 58 10.1109/MIC.2003.1250584
-
(2003)
IEEE Internet Comput
, vol.7
, Issue.6
, pp. 54-58
-
-
Millett, L.I.1
Holden, S.H.2
-
78
-
-
84861997111
-
Internet of things: Vision, applications and research challenges
-
D Miorandi, S Sicari, F De Pellegrini, and I Chlamtac Internet of things: vision, applications and research challenges Ad Hoc Netw 10 7 2012 1497 1516 10.1016/j.adhoc.2012.02.016
-
(2012)
Ad Hoc Netw
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
79
-
-
78650025148
-
Authentication and lightweight cryptography in low cost RFID
-
San Juan(United States of America): Institute of Electrical and Electronics Engineers
-
Mobahat H. Authentication and lightweight cryptography in low cost RFID. In: Proceedings of 2nd international conference on software technology and engineering, ICSTE 2010. San Juan(United States of America): Institute of Electrical and Electronics Engineers, 10.1109/ICSTE.2010.5608776; 2010. 123-9.
-
(2010)
Proceedings of 2nd International Conference on Software Technology and Engineering, ICSTE 2010
, pp. 123-129
-
-
Mobahat, H.1
-
80
-
-
84920157313
-
A survey on mitigation methods to black hole attack on AODV routing protocol
-
A Mohebi, and S. Scott A survey on mitigation methods to black hole attack on AODV routing protocol Netw Complex Syst 3 9 2013 30 36
-
(2013)
Netw Complex Syst
, vol.3
, Issue.9
, pp. 30-36
-
-
Mohebi, A.1
Scott, S.2
-
81
-
-
84876156481
-
Cyber-entity security in the Internet of Things
-
H Ning, H Liu, and LT Yang Cyber-entity security in the Internet of Things Computer 46 4 2013 46 53 10.1109/MC.2013.74
-
(2013)
Computer
, vol.46
, Issue.4
, pp. 46-53
-
-
Ning, H.1
Liu, H.2
Yang, L.T.3
-
83
-
-
84893764188
-
The Internet of Things: Do more devices mean more risks?
-
M O'Neill The Internet of Things: do more devices mean more risks? Comput Fraud Secur 2014 1 2014 16 17 10.1016/S1361-3723(14)70008-9
-
(2014)
Comput Fraud Secur
, vol.2014
, Issue.1
, pp. 16-17
-
-
O'Neill, M.1
-
84
-
-
79960017240
-
A survey of the research on future Internet architectures
-
J Pan, S Paul, and R. Jain A survey of the research on future Internet architectures IEEE Commun Mag 49 7 2011 26 36 10.1109/MCOM.2011.5936152
-
(2011)
IEEE Commun Mag
, vol.49
, Issue.7
, pp. 26-36
-
-
Pan, J.1
Paul, S.2
Jain, R.3
-
86
-
-
80053951920
-
Securing dynamic distributed storage systems against eavesdropping and adversarial attacks
-
S Pawar, S El Rouayheb, and K. Ramchandran Securing dynamic distributed storage systems against eavesdropping and adversarial attacks IEEE Trans Inf Theory 57 11 2011 6734 6753 10.1109/TIT.2011.2162191
-
(2011)
IEEE Trans Inf Theory
, vol.57
, Issue.11
, pp. 6734-6753
-
-
Pawar, S.1
El Rouayheb, S.2
Ramchandran, K.3
-
87
-
-
84900425671
-
Towards the era of wireless keys: How the IoT can change authentication paradigm
-
Petrov V, Edelev S, Komar M, Koucheryavy Y. Towards the era of wireless keys: how the IoT can change authentication paradigm. In: Proceedings of IEEE world forum on Internet of Things, WF-IoT 2014. Seoul (South Korea): Institute of Electrical and Electronics Engineers, 10.1109/WF-IoT.2014.6803116; 2014. 51-6.
-
(2014)
Proceedings of IEEE World Forum on Internet of Things, WF-IoT 2014. Seoul (South Korea): Institute of Electrical and Electronics Engineers
, pp. 51-56
-
-
Petrov, V.1
Edelev, S.2
Komar, M.3
Koucheryavy, Y.4
-
88
-
-
33747437914
-
Flooding attack and defence in ad hoc networks
-
Y Ping, H Yafei, Z Yiping, Z Shiyong, and D. Zhoulin Flooding attack and defence in ad hoc networks IEEE J Syst Eng Electron 17 2 2006 410 416 10.1016/S1004-4132(06)60070-4
-
(2006)
IEEE J Syst Eng Electron
, vol.17
, Issue.2
, pp. 410-416
-
-
Ping, Y.1
Yafei, H.2
Yiping, Z.3
Shiyong, Z.4
Zhoulin, D.5
-
90
-
-
4544337929
-
Online monitoring and analysis for self-protection against network attacks
-
Qu G, Hariri S, Jangiti S, Rudraraju J, Oh S, Fayssal S et al. Online monitoring and analysis for self-protection against network attacks. In: Proceedings of international conference on autonomic computing: Institute of Electrical and Electronics Engineers, 10.1109/ICAC.2004.1301398; 2004. 324-5.
-
(2004)
Proceedings of International Conference on Autonomic Computing: Institute of Electrical and Electronics Engineers
, pp. 324-325
-
-
Qu, G.1
Hariri, S.2
Jangiti, S.3
Rudraraju, J.4
Oh, S.5
Fayssal, S.6
-
92
-
-
84874841077
-
How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising attack
-
W Ren, L Yu, L Ma, and Y. Ren How to authenticate a device? Formal authentication models for M2M communications defending against ghost compromising attack Int J Distrib Sens Netw 2013 2013 1 9
-
(2013)
Int J Distrib Sens Netw
, vol.2013
, pp. 1-9
-
-
Ren, W.1
Yu, L.2
Ma, L.3
Ren, Y.4
-
93
-
-
84883330172
-
A systemic approach for IoT security
-
Riahi A, Challal Y, Natalizio E, Chtourou Z, Bouabdallah A. A systemic approach for IoT security. In: Proceedings of international conference on distributed computing in sensor systems, DCOSS 2013. Cambridge(United States of America): Institute of Electrical and Electronics Engineers, 10.1109/DCOSS.2013.78; 2013. 351-5.
-
(2013)
Proceedings of International Conference on Distributed Computing in Sensor Systems, DCOSS 2013. Cambridge(United States of America): Institute of Electrical and Electronics Engineers
, pp. 351-355
-
-
Riahi, A.1
Challal, Y.2
Natalizio, E.3
Chtourou, Z.4
Bouabdallah, A.5
-
94
-
-
80052854156
-
Securing the Internet of Things
-
R Roman, P Najera, and J Lopez Securing the Internet of Things Computer 44 9 2011 51 58 10.1109/MC.2011.291
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
95
-
-
84879225866
-
On the features and challenges of security and privacy in distributed Internet of Things
-
R Roman, J Zhou, and J. Lopez On the features and challenges of security and privacy in distributed Internet of Things Comput Netw 10 2013 2266 2279 10.1016/j.comnet.2012.12.018
-
(2013)
Comput Netw
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
96
-
-
84863304238
-
Secure and reliable clustering in wireless sensor networks: A critical survey
-
P Schaffer, K Farkas, Á Horváth, T Holczer, and L. Buttyán Secure and reliable clustering in wireless sensor networks: a critical survey Comput Netw 56 11 2012 2726 2741 10.1016/j.comnet.2012.03.021
-
(2012)
Comput Netw
, vol.56
, Issue.11
, pp. 2726-2741
-
-
Schaffer, P.1
Farkas, K.2
Horváth Á.3
Holczer, T.4
Buttyán, L.5
-
97
-
-
84871786265
-
Management of resource constrained devices in the Internet of Things
-
A Sehgal, V Perelman, S Kuryla, and J. Schonwalder Management of resource constrained devices in the Internet of Things IEEE Commun Mag 50 12 2012 144 149 10.1109/MCOM.2012.6384464
-
(2012)
IEEE Commun Mag
, vol.50
, Issue.12
, pp. 144-149
-
-
Sehgal, A.1
Perelman, V.2
Kuryla, S.3
Schonwalder, J.4
-
99
-
-
84891959392
-
Detection and mitigation of sinkhole attacks in wireless sensor networks
-
H Shafiei, A Khonsari, H Derakhshi, and P. Mousavi Detection and mitigation of sinkhole attacks in wireless sensor networks J Comput Syst Sci 80 3 2014 644 653 10.1016/j.jcss.2013.06.016
-
(2014)
J Comput Syst Sci
, vol.80
, Issue.3
, pp. 644-653
-
-
Shafiei, H.1
Khonsari, A.2
Derakhshi, H.3
Mousavi, P.4
-
103
-
-
84892614267
-
A survey on the IETF protocol suite for the Internet of Things: Standards, challenges, and opportunities
-
Z Sheng, S Yang, Y Yu, AV Vasilakos, JA McCann, and KK Leung A survey on the IETF protocol suite for the Internet of Things: standards, challenges, and opportunities IEEE Wirel Commun 20 6 2013 91 98 10.1109/MWC.2013.6704479
-
(2013)
IEEE Wirel Commun
, vol.20
, Issue.6
, pp. 91-98
-
-
Sheng, Z.1
Yang, S.2
Yu, Y.3
Vasilakos, A.V.4
McCann, J.A.5
Leung, K.K.6
-
104
-
-
84938746527
-
On the security of a certificateless online/offline signcryption for Internet of Things
-
W Shi, N Kumar, P Gong, N Chilamkurti, and H. Chang On the security of a certificateless online/offline signcryption for Internet of Things Peer-to-Peer Netw Appl 2014 1 5 10.1007/s12083-014-0249-3
-
(2014)
Peer-to-Peer Netw Appl
, pp. 1-5
-
-
Shi, W.1
Kumar, N.2
Gong, P.3
Chilamkurti, N.4
Chang, H.5
-
105
-
-
51349122673
-
Defending selective forwarding attacks in WMNs
-
Ames(United States of America): Institute of Electrical and Electronics Engineers
-
Shila DM, Anjali T. Defending selective forwarding attacks in WMNs. In: Proceedings of IEEE international conference on electro/information technology, EIT 2008. Ames(United States of America): Institute of Electrical and Electronics Engineers, 10.1109/EIT.2008.4554274; 2008. 96-101.
-
(2008)
Proceedings of IEEE International Conference on Electro/information Technology, EIT 2008
, pp. 96-101
-
-
Shila, D.M.1
Anjali, T.2
-
106
-
-
84901493878
-
Design and implementation of spectrally-encoded spread-time CDMA transceiver
-
M Shoreh, H Hosseinianfar, F Akhoundi, E Yazdian, M Farhang, and J. Salehi Design and implementation of spectrally-encoded spread-time CDMA transceiver IEEE Commun Lett 18 5 2014 741 744 10.1109/LCOMM.2014.033114.132471
-
(2014)
IEEE Commun Lett
, vol.18
, Issue.5
, pp. 741-744
-
-
Shoreh, M.1
Hosseinianfar, H.2
Akhoundi, F.3
Yazdian, E.4
Farhang, M.5
Salehi, J.6
-
107
-
-
79961235838
-
Hello flood attack and its countermeasures in wireless sensor networks
-
VP Singh, S Jain, and J. Singhai Hello flood attack and its countermeasures in wireless sensor networks Int J Comput Sci 7 11 2010 23 27
-
(2010)
Int J Comput Sci
, vol.7
, Issue.11
, pp. 23-27
-
-
Singh, V.P.1
Jain, S.2
Singhai, J.3
-
108
-
-
51249117686
-
WirelessHART: Applying wireless technology in real-time industrial process control
-
Song J, Han S, Mok AK, Chen Deji, Lucas M, Nixon M. WirelessHART: applying wireless technology in real-time industrial process control. In: Proceedings of real-time and embedded technology and applications symposium, RTAS 2008. St. Louis(United States of America): Institute of Electrical and Electronic Engineers, 10.1109/RTAS.2008.15; 2008. 377-86.
-
(2008)
Proceedings of Real-time and Embedded Technology and Applications Symposium, RTAS 2008. St. Louis(United States of America): Institute of Electrical and Electronic Engineers
, pp. 377-386
-
-
Song, J.1
Han, S.2
Mok, A.K.3
Deji, C.4
Lucas, M.5
Nixon, M.6
-
109
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalisation and suppression
-
L. Sweeney Achieving k-anonymity privacy protection using generalisation and suppression Int J Uncertain Fuzziness Knowl-Based Syst 10 5 2002 571 588 10.1142/S021848850200165X
-
(2002)
Int J Uncertain Fuzziness Knowl-Based Syst
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
112
-
-
84902447939
-
The ASSL formalism for real-time autonomic systems
-
Higuera-Toledano Teresa-M, Brinkschulte Uwe, Rettberg Achim, Springer New York
-
E. Vassev, and M. Hinchey The ASSL formalism for real-time autonomic systems Higuera-Toledano Teresa-M, Brinkschulte Uwe, Rettberg Achim, Self-organization in embedded real-time systems 2013 Springer New York 151 177 10.1007/978-1-4614-1969-3-8
-
(2013)
Self-organization in Embedded Real-time Systems
, pp. 151-177
-
-
Vassev, E.1
Hinchey, M.2
-
114
-
-
50249129528
-
Self-healing wireless sensor networks: Results that may surpirse
-
Washington (United States of America): Institute of Electrical and Electronics Engineers
-
Vlajic N, Moniz N. Self-healing wireless sensor networks: results that may surpirse. In: Proceedings of IEEE globecom workshops. Washington (United States of America): Institute of Electrical and Electronics Engineers, 10.1109/GLOCOMW.2007.4437830; 2007. 1-7.
-
(2007)
Proceedings of IEEE Globecom Workshops
, pp. 1-7
-
-
Vlajic, N.1
Moniz, N.2
-
115
-
-
84908888882
-
-
arXiv preprint arXiv:1404.7799 [cited 2014 Nov 2]. Available from
-
Vucinic M, Tourancheau B, Rousseau F, Duda A, Damon L, Guizzetti R. OSCAR: Object security architecture for the Internet of Things [Internet]. arXiv preprint arXiv:1404.7799; 2014 [cited 2014 Nov 2]. Available from: 〈http://arxiv.org/abs/1404.7799〉.
-
(2014)
OSCAR: Object Security Architecture for the Internet of Things [Internet]
-
-
Vucinic, M.1
Tourancheau, B.2
Rousseau, F.3
Duda, A.4
Damon, L.5
Guizzetti, R.6
-
116
-
-
51649100978
-
Efficient algorithms for p-self-protection problem in static wireless sensor networks
-
Y Wang, M Li, and Q. Zhang Efficient algorithms for p-self-protection problem in static wireless sensor networks IEEE Trans Parallel Distrib Syst 19 10 2008 1426 1438 10.1109/TPDS.2008.13
-
(2008)
IEEE Trans Parallel Distrib Syst
, vol.19
, Issue.10
, pp. 1426-1438
-
-
Wang, Y.1
Li, M.2
Zhang, Q.3
-
117
-
-
78751650165
-
P2P soft security: On evolutionary dynamics of P2P incentive mechanism
-
Y Wang, A Nakao, AV Vasilakos, and J Ma P2P soft security: on evolutionary dynamics of P2P incentive mechanism Comput Commun 34 3 2011 241 249 10.1016/j.comcom.2010.01.021
-
(2011)
Comput Commun
, vol.34
, Issue.3
, pp. 241-249
-
-
Wang, Y.1
Nakao, A.2
Vasilakos, A.V.3
Ma, J.4
-
118
-
-
35948968070
-
Self-healing routing: A study in efficiency and resiliency of data delivery in wireless sensor networks
-
Florida(United States of America):SPIE
-
Wasilewski K, Branch JW, Lisee M, Szymanski BK. Self-healing routing: a study in efficiency and resiliency of data delivery in wireless sensor networks. In: Proceedings of unattended ground, sea, and air sensor technologies and applications IX. Florida(United States of America):SPIE, 10.1117/12.723515; 2007.
-
(2007)
Proceedings of Unattended Ground, Sea, and Air Sensor Technologies and Applications IX
-
-
Wasilewski, K.1
Branch, J.W.2
Lisee, M.3
Szymanski, B.K.4
-
119
-
-
84893270272
-
From MANET to IETF ROLL Standardization: A paradigm shift in WSN routing protocols
-
T Watteyne, A Molinaro, MG Richichi, and M. Dohler From MANET to IETF ROLL Standardization: a paradigm shift in WSN routing protocols IEEE Commun Surv Tutor 13 4 2011 688 707 10.1109/SURV.2011.082710.00092
-
(2011)
IEEE Commun Surv Tutor
, vol.13
, Issue.4
, pp. 688-707
-
-
Watteyne, T.1
Molinaro, A.2
Richichi, M.G.3
Dohler, M.4
-
120
-
-
84889087663
-
Security and privacy for storage and computation in cloud computing
-
L Wei, H Zhu, Z Cao, X Dong, W Jia, and Y Chen Security and privacy for storage and computation in cloud computing Inf Sci 258 2014 371 386 10.1016/j.ins.2013.04.028
-
(2014)
Inf Sci
, vol.258
, pp. 371-386
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Dong, X.4
Jia, W.5
Chen, Y.6
-
121
-
-
79952020799
-
SecCloud: Bridging secure storage and computation in cloud
-
Genova(Italy): Institute of Electrical and Electronics Engineers
-
Wei L, Zhu H, Cao Z, Jia W, Vasilakos AV. SecCloud: bridging secure storage and computation in cloud. In: Proceedings of IEEE 30th International conference on distributed computing systems wokshops, ICDCSW 2010. Genova(Italy): Institute of Electrical and Electronics Engineers, 10.1109/ICDCSW.2010.36; 2010. 52-61.
-
(2010)
Proceedings of IEEE 30th International Conference on Distributed Computing Systems Wokshops, ICDCSW 2010
, pp. 52-61
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Jia, W.4
Vasilakos, A.V.5
-
122
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter Dieter, Müller Günter, Stephan Werner, Ullmann Markus, Springer Berlin Heidelberg
-
S.A. Weis, S.E. Sarma, R.L. Rivest, and D.W. Engels Security and privacy aspects of low-cost radio frequency identification systems Hutter Dieter, Müller Günter, Stephan Werner, Ullmann Markus, Security in pervasive computing 2004 Springer Berlin Heidelberg 201 212 10.1007/978-3-540-39881-3-18
-
(2004)
Security in Pervasive Computing
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
123
-
-
45749134626
-
DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks
-
San Diego(United States of America): Institute of Electrical and Electronics Engineers, doi:10.1109/SAHCN.2007.4292818
-
Wood A, Stankovic JA, Zhou G. DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: Proceedings of 4th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks, SECON '07. San Diego(United States of America): Institute of Electrical and Electronics Engineers, doi:10.1109/SAHCN.2007.4292818; 2007. 60-9.
-
(2007)
Proceedings of 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECon '07
, pp. 60-69
-
-
Wood, A.1
Stankovic, J.A.2
Zhou, G.3
-
125
-
-
84898646564
-
Trust-based adaptive routing for smart grid systems
-
M Xiang, Q Bai, and W Liu Trust-based adaptive routing for smart grid systems J Inf Process 22 2 2014 210 218 10.2197/ipsjjip.22.210
-
(2014)
J Inf Process
, vol.22
, Issue.2
, pp. 210-218
-
-
Xiang, M.1
Bai, Q.2
Liu, W.3
-
127
-
-
84901427258
-
A survey on trust management for Internet of Things
-
Z Yan, P Zhang, and AV Vasilakos A survey on trust management for Internet of Things J Netw Comput Appl 42 2014 120 134 10.1016/j.jnca.2014.01.014
-
(2014)
J Netw Comput Appl
, vol.42
, pp. 120-134
-
-
Yan, Z.1
Zhang, P.2
Vasilakos, A.V.3
-
128
-
-
45749116664
-
SybilLimit: A near-optimal social network defense against Sybil attacks
-
Oakland(United States of America): Institute of Electrical and Electronics Engineers, doi:
-
Yu H, Gibbons PB, Kaminsky M, Xiao F. SybilLimit: a near-optimal social network defense against Sybil attacks. In: Proceedings of symposium on security and privacy, SP 2008. Oakland(United States of America): Institute of Electrical and Electronics Engineers, doi: 10.1109/SP.2008.13; 2008a. 3-17.
-
(2008)
Proceedings of Symposium on Security and Privacy, SP 2008
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
129
-
-
45749109010
-
SybilGuard: Defending against Sybil attacks via social networks
-
H Yu, M Kaminsky, PB Gibbons, and AD Flaxman SybilGuard: defending against Sybil attacks via social networks IEEE/ACM Trans Netw 16 3 2008 576 589 10.1109/TNET.2008.923723
-
(2008)
IEEE/ACM Trans Netw
, vol.16
, Issue.3
, pp. 576-589
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.D.4
-
130
-
-
79960389467
-
Evaluation on security system of Internet of Things based on fuzzy-AHP method
-
Shanghai (China): Institute of Electrical and Electronics Engineers
-
Zhang B, Zou Z, Liu M. Evaluation on security system of Internet of Things based on fuzzy-AHP method. In: Proceedings of the international conference on e-business and e-government, ICEE 2011. Shanghai (China): Institute of Electrical and Electronics Engineers, 10.1109/ICEBEG.2011.5881939; 2011. 1-5.
-
(2011)
Proceedings of the International Conference on E-business and E-government, ICEE 2011
, pp. 1-5
-
-
Zhang, B.1
Zou, Z.2
Liu, M.3
-
131
-
-
0141621108
-
GS3: Scalable self-configuring and self-healing in wireless sensor networks
-
H Zhang, and A. Arora GS3: scalable self-configuring and self-healing in wireless sensor networks Comput Netw 43 4 2003 459 480 10.1016/S1389-1286(03)00354-2
-
(2003)
Comput Netw
, vol.43
, Issue.4
, pp. 459-480
-
-
Zhang, H.1
Arora, A.2
-
133
-
-
81355138526
-
The Internet of Things
-
J Zheng, D Simplot-Ryl, C Bisdikian, and HT. Mouftah The Internet of Things IEEE Commun Mag 49 11 2011 30 31
-
(2011)
IEEE Commun Mag
, vol.49
, Issue.11
, pp. 30-31
-
-
Zheng, J.1
Simplot-Ryl, D.2
Bisdikian, C.3
Mouftah, H.T.4
-
134
-
-
79957583041
-
Multimedia traffic security architecture for the Internet of Things
-
L Zhou, and HC. Chao Multimedia traffic security architecture for the Internet of Things IEEE Netw 25 3 2011 35 40 10.1109/MNET.2011.5772059
-
(2011)
IEEE Netw
, vol.25
, Issue.3
, pp. 35-40
-
-
Zhou, L.1
Chao, H.C.2
-
135
-
-
79951967501
-
P2DAP- Sybil attacks detection in vehicular ad hoc networks
-
T Zhou, RR Choudhury, P Ning, and K. Chakrabarty P2DAP- Sybil attacks detection in vehicular ad hoc networks IEEE J Sel Areas Commun 29 3 2011 582 594 10.1109/JSAC.2011.110308
-
(2011)
IEEE J Sel Areas Commun
, vol.29
, Issue.3
, pp. 582-594
-
-
Zhou, T.1
Choudhury, R.R.2
Ning, P.3
Chakrabarty, K.4
|