-
1
-
-
0142103313
-
Security and privacy in sensor networks
-
Oct.
-
H. Chan and A Perrig, "Security and privacy in sensor networks," Comput., vol. 36, no. 10, pp. 103-105, Oct. 2003.
-
(2003)
Comput.
, vol.36
, Issue.10
, pp. 103-105
-
-
Chan, H.1
Perrig, A.2
-
2
-
-
67349219359
-
Pervasive, secure access to a hierarchical-based health-care monitoring architecture in wireless heterogeneous sensor networks
-
May
-
Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park, "Pervasive, secure access to a hierarchical-based health-care monitoring architecture in wireless heterogeneous sensor networks," IEEE J. Sel. Areas Commun., vol. 24, no. 7, pp. 400-411, May 2009.
-
(2009)
IEEE J. Sel. Areas Commun.
, vol.24
, Issue.7
, pp. 400-411
-
-
Huang, Y.M.1
Hsieh, M.Y.2
Chao, H.C.3
Hung, S.H.4
Park, J.H.5
-
3
-
-
77956607253
-
Opportunities and challenges of wireless sensor networks in smart grid
-
Oct.
-
V. C. Gungor, L. Bin, and G. P. Hancke, "Opportunities and challenges of wireless sensor networks in smart grid," IEEE Trans. Ind. Electron., vol. 57, no. 10, pp. 3557-3564, Oct. 2010.
-
(2010)
IEEE Trans. Ind. Electron.
, vol.57
, Issue.10
, pp. 3557-3564
-
-
Gungor, V.C.1
Bin, L.2
Hancke, G.P.3
-
4
-
-
84891933258
-
Managements and applications of trust in wireless sensor networks: A Survey
-
G. Han, J. Jiang, L. Shu, J. Niu, and H. C. Chao, "Managements and applications of trust in wireless sensor networks: A Survey," J. Comput. Syst. Sci., vol. 80, no. 3, pp. 602-617, 2014.
-
(2014)
J. Comput. Syst. Sci.
, vol.80
, Issue.3
, pp. 602-617
-
-
Han, G.1
Jiang, J.2
Shu, L.3
Niu, J.4
Chao, H.C.5
-
5
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., 2004, pp. 66-77.
-
Proc. 2nd ACM Workshop Security Ad Hoc Sensor Netw., 2004
, pp. 66-77
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
6
-
-
39049103908
-
PLUS: Parameterized and localized trust management scheme for sensor networks security
-
Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and localized trust management scheme for sensor networks security," in Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., 2008, pp. 437-446.
-
Proc. IEEE Int. Conf. Mobile Adhoc Sensor Syst., 2008
, pp. 437-446
-
-
Yao, Z.1
Kim, D.2
Doh, Y.3
-
7
-
-
79952097418
-
A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory
-
R. Feng, X. Xu, X. Zhou, and J. Wan, "A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory," Sensors, vol. 11, pp. 1345-1360, 2011.
-
(2011)
Sensors
, vol.11
, pp. 1345-1360
-
-
Feng, R.1
Xu, X.2
Zhou, X.3
Wan, J.4
-
8
-
-
84947615454
-
Cross-layer optimized routing in WSN with duty-cycle and energy harvesting
-
3 Feb.
-
G. Han, Y. Dong, H. Guo, L. Shu, and D. Wu, "Cross-layer optimized routing in WSN with duty-cycle and energy harvesting," Wireless Commun. Mobile Comput., 3 Feb. 2014, DOI: 10.1002/wcm.2468.
-
(2014)
Wireless Commun. Mobile Comput.
-
-
Han, G.1
Dong, Y.2
Guo, H.3
Shu, L.4
Wu, D.5
-
9
-
-
84870706790
-
The insights of localization through mobile anchor nodes in wireless sensor networks with irregular radio
-
G. Han, X. Xu, J. Jiang, L. Shu, and N. Chilamkurti, "The insights of localization through mobile anchor nodes in wireless sensor networks with irregular radio," KSII Trans. Internet Inf. Syst., vol. 6, pp. 2992-3007, 2012.
-
(2012)
KSII Trans. Internet Inf. Syst.
, vol.6
, pp. 2992-3007
-
-
Han, G.1
Xu, X.2
Jiang, J.3
Shu, L.4
Chilamkurti, N.5
-
10
-
-
84861334371
-
Trust computations and trust dynamics in mobile ad hoc networks: A survey
-
2nd Quarter
-
K. Govindan and P. Mohapatra, "Trust computations and trust dynamics in mobile ad hoc networks: A survey," IEEE Commun. Surveys Tuts., vol. 14, no. 2, pp. 279-298, 2nd Quarter 2012.
-
(2012)
IEEE Commun. Surveys Tuts.
, vol.14
, Issue.2
, pp. 279-298
-
-
Govindan, K.1
Mohapatra, P.2
-
11
-
-
84874285180
-
Trustworthiness in networks: A simulation approach for approximating local trust and distrust values
-
K. Nordheimer, T. Schulze, and D. Veit, "Trustworthiness in networks: A simulation approach for approximating local trust and distrust values," IEEE Commun. Surveys Tuts., vol. 321, pp. 157-171, 2010.
-
(2010)
IEEE Commun. Surveys Tuts.
, vol.321
, pp. 157-171
-
-
Nordheimer, K.1
Schulze, T.2
Veit, D.3
-
13
-
-
77958605337
-
A trust model based on subjective logic
-
W. Gao, G. Zhang, W. Chen, and Y. Li, "A trust model based on subjective logic," in Proc. 4th Int. Conf. Internet Comput. Sci. Eng., 2009, pp. 272-276.
-
Proc. 4th Int. Conf. Internet Comput. Sci. Eng., 2009
, pp. 272-276
-
-
Gao, W.1
Zhang, G.2
Chen, W.3
Li, Y.4
-
14
-
-
84927611662
-
Ray projection method and its applications based on Grey Prediction
-
M. Chen, Y. Zhou, and L, Tang, "Ray projection method and its applications based on Grey Prediction," Chinese J. Statist. Decision, vol. 1, p. 13, 2007.
-
(2007)
Chinese J. Statist. Decision
, vol.1
, pp. 13
-
-
Chen, M.1
Zhou, Y.2
Tang, L.3
-
15
-
-
78149345705
-
Provenance based trustworthiness assessment in sensor networks
-
H. S. Lim, Y. S. Moon, and E. Bertino, "Provenance based trustworthiness assessment in sensor networks," in Proc. 7th Int. Workshop Data Manage. Sens. Netw., 2010, pp. 2-7.
-
Proc. 7th Int. Workshop Data Manage. Sens. Netw., 2010
, pp. 2-7
-
-
Lim, H.S.1
Moon, Y.S.2
Bertino, E.3
-
18
-
-
84871870154
-
Normal distribution based dynamical recommendation trust model
-
K. Shao, F. Luo, N. Mei, and Z. Liu, "Normal distribution based dynamical recommendation trust model," J. Softw., vol. 23, no. 12, pp. 3130-3148, 2012.
-
(2012)
J. Softw.
, vol.23
, Issue.12
, pp. 3130-3148
-
-
Shao, K.1
Luo, F.2
Mei, N.3
Liu, Z.4
|