메뉴 건너뛰기




Volumn 2015, Issue , 2015, Pages

Mitigating on-off attacks in the internet of things using a distributed trust management scheme

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET; TRUSTED COMPUTING;

EID: 84948658189     PISSN: 15501329     EISSN: 15501477     Source Type: Journal    
DOI: 10.1155/2015/859731     Document Type: Article
Times cited : (83)

References (18)
  • 1
    • 84861997111 scopus 로고    scopus 로고
    • Internet of things: Vision, applications and research challenges
    • D. Miorandi, S. Sicari, F. De Pellegrini, and I. Chlamtac, Internet of things: vision, applications and research challenges," Ad Hoc Networks, vol. 10, no. 7, pp. 1497-1516, 2012.
    • (2012) Ad Hoc Networks , vol.10 , Issue.7 , pp. 1497-1516
    • Miorandi, D.1    Sicari, S.2    De Pellegrini, F.3    Chlamtac, I.4
  • 2
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • L. Atzori, A. Iera, and G. Morabito, "The internet of things: a survey " ComputerNetworks, vol. 54, no. 15, pp. 2787-2805, 2010.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 3
    • 80052854156 scopus 로고    scopus 로고
    • Securing the internet of things
    • Article ID 6017172
    • R. Roman, P. Najera, and J. Lopez, "Securing the internet of things " Computer, vol. 44, no. 9, Article ID 6017172, pp. 51-58, 2011.
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 4
    • 84879225866 scopus 로고    scopus 로고
    • Onthe features andchallenges of security and privacy in distributed internet of things
    • R. Roman, J. Zhou, and J. Lopez, Onthe features andchallenges of security and privacy in distributed internet of things," Computer Networks, vol. 57, no. 10, pp. 2266-2279, 2013.
    • (2013) Computer Networks , vol.57 , Issue.10 , pp. 2266-2279
    • Roman, R.1    Zhou, J.2    Lopez, J.3
  • 5
    • 84857844113 scopus 로고    scopus 로고
    • A survey on trust management for mobile ad hoc networks
    • J.-H. Cho, A. Swami, and I.-R. Chen, "A survey on trust management for mobile ad hoc networks " IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 562-583, 2011.
    • (2011) IEEE Communications Surveys & Tutorials , vol.13 , Issue.4 , pp. 562-583
    • Cho, J.-H.1    Swami, A.2    Chen, I.-R.3
  • 6
    • 84863072784 scopus 로고    scopus 로고
    • A survey of trust management in WSNs, internet of things and future internet
    • K.-D. Chang and J.-L. Chen, A survey of trust management in WSNs, internet of things and future internet," KSII Transactions on Internet and Information Systems, vol. 6, no. 1, pp. 5-23, 2012.
    • (2012) KSII Transactions on Internet and Information Systems , vol.6 , Issue.1 , pp. 5-23
    • Chang, K.-D.1    Chen, J.-L.2
  • 7
    • 84891933258 scopus 로고    scopus 로고
    • Management and applications of trust in Wireless SensorNetworks: A survey
    • G. Han, J. Jiang, L. Shu, J. Niu, and H.-C. Chao, Management and applications of trust inWireless SensorNetworks: a survey," Journal of Computer and SystemSciences, vol. 80, no. 3, pp. 602-617, 2014.
    • (2014) Journal of Computer and SystemSciences , vol.80 , Issue.3 , pp. 602-617
    • Han, G.1    Jiang, J.2    Shu, L.3    Niu, J.4    Chao, H.-C.5
  • 9
    • 83555166001 scopus 로고    scopus 로고
    • Reflections on trust in devices: An informal survey of human trust in an Internet-of-Things context
    • G. M. Kien, "Reflections on trust in devices: an informal survey of human trust in an Internet-of-Things context Wireless Personal Communications, vol. 61, no. 3, pp. 495-510, 2011.
    • (2011) Wireless Personal Communications , vol.61 , Issue.3 , pp. 495-510
    • Kien, G.M.1
  • 11
    • 84888861197 scopus 로고    scopus 로고
    • Trust management system design for the Internet of Things: A context-aware and multi-service approach
    • Y. B. Saied, A. Olivereau, D. Zeghlache, and M. Laurent, Trust management system design for the Internet of Things: a context-aware and multi-service approach," Computers & Security, vol. 39, pp. 351-365, 2013.
    • (2013) Computers & Security , vol.39 , pp. 351-365
    • Saied, Y.B.1    Olivereau, A.2    Zeghlache, D.3    Laurent, M.4
  • 15
    • 84866346403 scopus 로고    scopus 로고
    • TRMIoT: A trust management model based on fuzzy reputation for internet of things
    • D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X. Wang, TRMIoT: a trust management model based on fuzzy reputation for internet of things," Computer Science and Information Systems, vol. 8, no. 4, pp. 1207-1228, 2011.
    • (2011) Computer Science and Information Systems , vol.8 , Issue.4 , pp. 1207-1228
    • Chen, D.1    Chang, G.2    Sun, D.3    Li, J.4    Jia, J.5    Wang, X.6


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.