-
1
-
-
84861997111
-
Internet of things: Vision, applications and research challenges
-
D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, Internet of things: vision, applications and research challenges," Ad Hoc Networks, vol. 10, no. 7, pp. 1497-1516, 2012.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.7
, pp. 1497-1516
-
-
Miorandi, D.1
Sicari, S.2
De Pellegrini, F.3
Chlamtac, I.4
-
2
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito, "The internet of things: a survey " ComputerNetworks, vol. 54, no. 15, pp. 2787-2805, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
3
-
-
80052854156
-
Securing the internet of things
-
Article ID 6017172
-
R. Roman, P. Najera, and J. Lopez, "Securing the internet of things " Computer, vol. 44, no. 9, Article ID 6017172, pp. 51-58, 2011.
-
(2011)
Computer
, vol.44
, Issue.9
, pp. 51-58
-
-
Roman, R.1
Najera, P.2
Lopez, J.3
-
4
-
-
84879225866
-
Onthe features andchallenges of security and privacy in distributed internet of things
-
R. Roman, J. Zhou, and J. Lopez, Onthe features andchallenges of security and privacy in distributed internet of things," Computer Networks, vol. 57, no. 10, pp. 2266-2279, 2013.
-
(2013)
Computer Networks
, vol.57
, Issue.10
, pp. 2266-2279
-
-
Roman, R.1
Zhou, J.2
Lopez, J.3
-
5
-
-
84857844113
-
A survey on trust management for mobile ad hoc networks
-
J.-H. Cho, A. Swami, and I.-R. Chen, "A survey on trust management for mobile ad hoc networks " IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 562-583, 2011.
-
(2011)
IEEE Communications Surveys & Tutorials
, vol.13
, Issue.4
, pp. 562-583
-
-
Cho, J.-H.1
Swami, A.2
Chen, I.-R.3
-
6
-
-
84863072784
-
A survey of trust management in WSNs, internet of things and future internet
-
K.-D. Chang and J.-L. Chen, A survey of trust management in WSNs, internet of things and future internet," KSII Transactions on Internet and Information Systems, vol. 6, no. 1, pp. 5-23, 2012.
-
(2012)
KSII Transactions on Internet and Information Systems
, vol.6
, Issue.1
, pp. 5-23
-
-
Chang, K.-D.1
Chen, J.-L.2
-
7
-
-
84891933258
-
Management and applications of trust in Wireless SensorNetworks: A survey
-
G. Han, J. Jiang, L. Shu, J. Niu, and H.-C. Chao, Management and applications of trust inWireless SensorNetworks: a survey," Journal of Computer and SystemSciences, vol. 80, no. 3, pp. 602-617, 2014.
-
(2014)
Journal of Computer and SystemSciences
, vol.80
, Issue.3
, pp. 602-617
-
-
Han, G.1
Jiang, J.2
Shu, L.3
Niu, J.4
Chao, H.-C.5
-
8
-
-
84901427258
-
A survey on trust management for Internet of Things
-
Z. Yan, P. Zhang, and A. V. Vasilakos, "A survey on trust management for Internet of Things " Journal of Network and Computer Applications, vol. 42, pp. 120-134, 2014.
-
(2014)
Journal of Network and Computer Applications
, vol.42
, pp. 120-134
-
-
Yan, Z.1
Zhang, P.2
Vasilakos, A.V.3
-
9
-
-
83555166001
-
Reflections on trust in devices: An informal survey of human trust in an Internet-of-Things context
-
G. M. Kien, "Reflections on trust in devices: an informal survey of human trust in an Internet-of-Things context Wireless Personal Communications, vol. 61, no. 3, pp. 495-510, 2011.
-
(2011)
Wireless Personal Communications
, vol.61
, Issue.3
, pp. 495-510
-
-
Kien, G.M.1
-
10
-
-
84872848897
-
Internet of things: Where to be is to trust
-
article 203
-
R. Lacuesta, G. Palacios-Navarro, C. Cetina, L. Peñalver, and J. Lloret, Internet of things: where to be is to trust," EURASIP Journal onWireless Communications and Networking, vol. 2012, article 203, 16 pages, 2012.
-
(2012)
EURASIP Journal OnWireless Communications and Networking
, vol.2012
, pp. 16
-
-
Lacuesta, R.1
Palacios-Navarro, G.2
Cetina, C.3
Peñalver, L.4
Lloret, J.5
-
11
-
-
84888861197
-
Trust management system design for the Internet of Things: A context-aware and multi-service approach
-
Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent, Trust management system design for the Internet of Things: a context-aware and multi-service approach," Computers & Security, vol. 39, pp. 351-365, 2013.
-
(2013)
Computers & Security
, vol.39
, pp. 351-365
-
-
Saied, Y.B.1
Olivereau, A.2
Zeghlache, D.3
Laurent, M.4
-
12
-
-
84867693994
-
Dynamic trustmanagement for internet of things applications
-
ACM, San Jose, Calif, USA, September
-
F. Bao and I.-R. Chen, "Dynamic trustmanagement for internet of things applications " in Proceedings of the 1st International Workshop on Self-Aware Internet ofThings (Self-IoT 12), pp. 1-6, ACM, San Jose, Calif, USA, September 2012.
-
(2012)
Proceedings of the 1st International Workshop on Self-Aware Internet of Things (Self-IoT 12)
, pp. 1-6
-
-
Bao, F.1
Chen, I.-R.2
-
13
-
-
84866382206
-
Trust management for the internet of things and its application to service composition
-
San Francisco, Calif, USA, June
-
F. Bao and I.-R. Chen, "Trust management for the internet of things and its application to service composition," in Proceedings of the 13th IEEE International Symposium on a World of Wireless, Mobile andMultimedia Networks (WoWMoM12), pp. 1-6, San Francisco, Calif, USA, June 2012.
-
(2012)
Proceedings of the 13th IEEE International Symposium on A World of Wireless, Mobile AndMultimedia Networks (WoWMoM12)
, pp. 1-6
-
-
Bao, F.1
Chen, I.-R.2
-
14
-
-
84867066764
-
An efficient trust evaluation approach in attacker dominated networks in internet of things
-
W. Liu, L. Yin, B. Fang, and X. Yu, An efficient trust evaluation approach in attacker dominated networks in internet of things," in Future Information Technology, Application, and Service, vol. 164 of Lecture Notes in Electrical Engineering, pp. 559-567, 2012.
-
(2012)
Future Information Technology, Application, and Service, Vol. 164 of Lecture Notes in Electrical Engineering
, pp. 559-567
-
-
Liu, W.1
Yin, L.2
Fang, B.3
Yu, X.4
-
15
-
-
84866346403
-
TRMIoT: A trust management model based on fuzzy reputation for internet of things
-
D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X. Wang, TRMIoT: a trust management model based on fuzzy reputation for internet of things," Computer Science and Information Systems, vol. 8, no. 4, pp. 1207-1228, 2011.
-
(2011)
Computer Science and Information Systems
, vol.8
, Issue.4
, pp. 1207-1228
-
-
Chen, D.1
Chang, G.2
Sun, D.3
Li, J.4
Jia, J.5
Wang, X.6
-
16
-
-
84931056000
-
On-off attacks mitigation against trust systems inwireless sensor networks
-
Saida, Algeria, May
-
N. Labraoui, M. Gueroui, and L. Sekhri, On-off attacks mitigation against trust systems inwireless sensor networks," in Proceedings of the 5th IFIP International Conference on Computer Science and Its Applications (CIIA 15), vol. 456 of IFIP Advances in Information and Communication Technology, pp. 406-415, Saida, Algeria, May 2015.
-
(2015)
Proceedings of the 5th IFIP International Conference on Computer Science and Its Applications (CIIA 15), Vol. 456 of IFIP Advances in Information and Communication Technology
, pp. 406-415
-
-
Labraoui, N.1
Gueroui, M.2
Sekhri, L.3
-
17
-
-
84925062174
-
Trust management for defending on-off attacks
-
Y. Chae, L. C. DiPippo, and Y. L. Sun, "Trust management for defending on-off attacks " IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 4, pp. 1178-1191, 2015.
-
(2015)
IEEE Tractions on Parallel and Distributed Systems
, vol.26
, Issue.4
, pp. 1178-1191
-
-
Chae, Y.1
DiPippo, L.C.2
Sun, Y.L.3
|