-
1
-
-
84902949347
-
Mobile target detection in wireless sensor networks with adjustable sensing frequency
-
to be published
-
Y. Hu, M. Dong, K. Ota, A. Liu, and M. Guo, "Mobile target detection in wireless sensor networks with adjustable sensing frequency, " IEEE Syst. J., to be published, doi: 10.1109/JSYST.2014.2308391.
-
IEEE Syst. J
-
-
Hu, Y.1
Dong, M.2
Ota, K.3
Liu, A.4
Guo, M.5
-
2
-
-
84961727422
-
Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks
-
Jan
-
M. Dong, K. Ota, A. Liu, and M. Guo, "Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 225-236, Jan. 2016.
-
(2016)
IEEE Trans. Parallel Distrib. Syst
, vol.27
, Issue.1
, pp. 225-236
-
-
Dong, M.1
Ota, K.2
Liu, A.3
Guo, M.4
-
3
-
-
84883113038
-
Energy provisioning in wireless rechargeable sensor networks
-
Oct
-
S. He, J. Chen, F. Jiang, D. K. Y. Yau, G. Xing, and Y. Sun, "Energy provisioning in wireless rechargeable sensor networks, " IEEE Trans. Mobile Comput., vol. 12, no. 10, pp. 1931-1942, Oct. 2013.
-
(2013)
IEEE Trans. Mobile Comput
, vol.12
, Issue.10
, pp. 1931-1942
-
-
He, S.1
Chen, J.2
Jiang, F.3
Yau, D.K.Y.4
Xing, G.5
Sun, Y.6
-
4
-
-
84963804113
-
Service pricing decision in cyber-physical systems: Insights from game theory
-
Mar./Apr
-
X. Liu, M. Dong, K. Ota, P. Hung, and A. Liu, "Service pricing decision in cyber-physical systems: Insights from game theory, " IEEE Trans. Services Comput., vol. 9, no. 2, pp. 186-198, Mar./Apr. 2016.
-
(2016)
IEEE Trans. Services Comput
, vol.9
, Issue.2
, pp. 186-198
-
-
Liu, X.1
Dong, M.2
Ota, K.3
Hung, P.4
Liu, A.5
-
5
-
-
84919816091
-
An authenticated trust and reputation calculation and management system for cloud and sensor networks integration
-
Jan
-
C. Zhu, H. Nicanfar, V. C. M. Leung, and L. T. Yang, "An authenticated trust and reputation calculation and management system for cloud and sensor networks integration, " IEEE Trans. Inf. Forensics Security, vol. 10, no. 1, pp. 118-131, Jan. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.1
, pp. 118-131
-
-
Zhu, C.1
Nicanfar, H.2
Leung, V.C.M.3
Yang, L.T.4
-
6
-
-
84949818989
-
PHACK: An efficient scheme for selective forwarding attack detection in WSNs
-
A. Liu, M. Dong, K. Ota, and J. Long, "PHACK: An efficient scheme for selective forwarding attack detection in WSNs, " Sensors, vol. 15, no. 12, pp. 30942-30963, 2015.
-
(2015)
Sensors
, vol.15
, Issue.12
, pp. 30942-30963
-
-
Liu, A.1
Dong, M.2
Ota, K.3
Long, J.4
-
7
-
-
84874114967
-
Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network
-
May
-
A. Liu, X. Jin, G. Cui, and Z. Chen, "Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network, " Inf. Sci., vol. 230, pp. 197-226, May 2013.
-
(2013)
Inf. Sci
, vol.230
, pp. 197-226
-
-
Liu, A.1
Jin, X.2
Cui, G.3
Chen, Z.4
-
8
-
-
84963850053
-
Energy and memory efficient clone detection in wireless sensor networks
-
May
-
Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, "Energy and memory efficient clone detection in wireless sensor networks, " IEEE Trans. Mobile Comput., vol. 15, no. 5, pp. 1130-1143, May 2016.
-
(2016)
IEEE Trans. Mobile Comput
, vol.15
, Issue.5
, pp. 1130-1143
-
-
Zheng, Z.1
Liu, A.2
Cai, L.X.3
Chen, Z.4
Shen, X.5
-
9
-
-
77952986444
-
Secure data collection in wireless sensor networks using randomized dispersive routes
-
Jul
-
T. Shu, M. Krunz, and S. Liu, "Secure data collection in wireless sensor networks using randomized dispersive routes, " IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941-954, Jul. 2010.
-
(2010)
IEEE Trans. Mobile Comput
, vol.9
, Issue.7
, pp. 941-954
-
-
Shu, T.1
Krunz, M.2
Liu, S.3
-
10
-
-
84923218786
-
Toward energy-efficient trust system through watchdog optimization for WSNs
-
Mar
-
P. Zhou, S. Jiang, A. Irissappane, J. Zhang, J. Zhou, and J. C. M. Teo, "Toward energy-efficient trust system through watchdog optimization for WSNs, " IEEE Trans. Inf. Forensics Security, vol. 10, no. 3, pp. 613-625, Mar. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.3
, pp. 613-625
-
-
Zhou, P.1
Jiang, S.2
Irissappane, A.3
Zhang, J.4
Zhou, J.5
Teo, J.C.M.6
-
11
-
-
84908240474
-
Differential game-based strategies for preventing malware propagation in wireless sensor networks
-
Nov
-
S. Shen, H. Li, R. Han, A. V. Vasilakos, Y. Wang, and Q. Cao, "Differential game-based strategies for preventing malware propagation in wireless sensor networks, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1962-1973, Nov. 2014.
-
(2014)
IEEE Trans. Inf. Forensics Security
, vol.9
, Issue.11
, pp. 1962-1973
-
-
Shen, S.1
Li, H.2
Han, R.3
Vasilakos, A.V.4
Wang, Y.5
Cao, Q.6
-
12
-
-
55249109242
-
Load-balancing in MANET shortest-path routing protocols
-
O. Souihli, M. Frikha, and M. B. Hamouda, "Load-balancing in MANET shortest-path routing protocols, " Ad Hoc Netw., vol. 7, no. 2, pp. 431-442, 2009.
-
(2009)
Ad Hoc Netw
, vol.7
, Issue.2
, pp. 431-442
-
-
Souihli, O.1
Frikha, M.2
Hamouda, M.B.3
-
13
-
-
84929164299
-
An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing
-
Jul
-
J. Long, A. Liu, M. Dong, and Z. Li, "An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing, " J. Parallel Distrib. Comput., vols. 81-82, pp. 47-65, Jul. 2015.
-
(2015)
J. Parallel Distrib. Comput
, vol.81-82
, pp. 47-65
-
-
Long, J.1
Liu, A.2
Dong, M.3
Li, Z.4
-
14
-
-
84902184986
-
Mobility and intruder prior information improving the barrier coverage of sparse sensor networks
-
Jun
-
S. He, J. Chen, X. Li, X. Shen, and Y. Sun, "Mobility and intruder prior information improving the barrier coverage of sparse sensor networks, " IEEE Trans. Mobile Comput., vol. 13, no. 6, pp. 1268-1282, Jun. 2015.
-
(2015)
IEEE Trans. Mobile Comput
, vol.13
, Issue.6
, pp. 1268-1282
-
-
He, S.1
Chen, J.2
Li, X.3
Shen, X.4
Sun, Y.5
-
15
-
-
84921344790
-
Effective key management in dynamic wireless sensor networks
-
Feb
-
S. H. Seo, J. Won, S. Sultana, and E. Bertino, "Effective key management in dynamic wireless sensor networks, " IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 371-383, Feb. 2015.
-
(2015)
IEEE Trans. Inf. Forensics Security
, vol.10
, Issue.2
, pp. 371-383
-
-
Seo, S.H.1
Won, J.2
Sultana, S.3
Bertino, E.4
-
16
-
-
84938847954
-
An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs
-
Y. Hu and A. Liu, "An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs, " Comput. J., vol. 58, no. 8, pp. 1747-1762, 2015.
-
(2015)
Comput. J
, vol.58
, Issue.8
, pp. 1747-1762
-
-
Hu, Y.1
Liu, A.2
-
17
-
-
0034844688
-
Split multipath routing with maximally disjoint paths in ad hoc networks
-
Jun
-
S.-J. Lee and M. Gerla, "Split multipath routing with maximally disjoint paths in ad hoc networks, " in Proc. IEEE ICC, Jun. 2011, pp. 3201-3205.
-
(2011)
Proc. IEEE ICC
, pp. 3201-3205
-
-
Lee, S.-J.1
Gerla, M.2
-
18
-
-
84890890871
-
Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks
-
to be published
-
Y. Zhang, S. He, and J. Chen, "Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks, " IEEE/ACM Trans. Netw., to be published, doi:10.1109/TNET.2015.2425146.
-
IEEE/ACM Trans. Netw
-
-
Zhang, Y.1
He, S.2
Chen, J.3
-
19
-
-
77955281759
-
A multi-path interleaved hop-by-hop enroute filtering scheme in wireless sensor networks
-
T. P. Nghiem and T. H. Cho, "A multi-path interleaved hop-by-hop enroute filtering scheme in wireless sensor networks, " Comput. Commun., vol. 33, no. 10, pp. 1202-1209, 2010.
-
(2010)
Comput. Commun
, vol.33
, Issue.10
, pp. 1202-1209
-
-
Nghiem, T.P.1
Cho, T.H.2
-
20
-
-
84858038684
-
Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
-
Y. Yu, K. Li, W. Zhou, and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures, " J. Netw. Comput. Appl., vol. 35, no. 3, pp. 867-880, 2012.
-
(2012)
J. Netw. Comput. Appl
, vol.35
, Issue.3
, pp. 867-880
-
-
Yu, Y.1
Li, K.2
Zhou, W.3
Li, P.4
-
21
-
-
4544283175
-
SORI: A secure and objective reputationbased incentive scheme for ad-hoc networks
-
Mar
-
Q. He, D. Wu, and P. Khosla, "SORI: A secure and objective reputationbased incentive scheme for ad-hoc networks, " in Proc. IEEE Wireless Commun. Netw. Conf., Mar. 2004, pp. 825-830.
-
(2004)
Proc. IEEE Wireless Commun. Netw. Conf
, pp. 825-830
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
22
-
-
84880467894
-
The Eigentrust algorithm for reputation management in P2P networks
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The Eigentrust algorithm for reputation management in P2P networks, " in Proc. 12th Int. Conf. World Wide Web, 2003, pp. 640-651.
-
(2003)
Proc. 12th Int. Conf. World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
23
-
-
84864659174
-
Combining trust with location information for routing in wireless sensor networks
-
H. C. Leligou, P. Trakadas, S. Maniatis, P. Karkazis, and T. Zahariadis, "Combining trust with location information for routing in wireless sensor networks, " Wireless Commun. Mobile Comput., vol. 12, no. 12, pp. 1091-1103, 2012.
-
(2012)
Wireless Commun. Mobile Comput
, vol.12
, Issue.12
, pp. 1091-1103
-
-
Leligou, H.C.1
Trakadas, P.2
Maniatis, S.3
Karkazis, P.4
Zahariadis, T.5
-
24
-
-
79956101475
-
Building a trusted route in a mobile ad hoc network considering communication reliability and path length
-
J. Wang, Y. Liu, and Y. Jiao, "Building a trusted route in a mobile ad hoc network considering communication reliability and path length, " J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1138-1149, 2011.
-
(2011)
J. Netw. Comput. Appl
, vol.34
, Issue.4
, pp. 1138-1149
-
-
Wang, J.1
Liu, Y.2
Jiao, Y.3
-
25
-
-
48649095029
-
An efficient countermeasure to the selective forwarding attack in wireless sensor networks
-
Oct./Nov
-
H.-M. Sun, C.-M. Chen, and Y.-C. Hsiao, "An efficient countermeasure to the selective forwarding attack in wireless sensor networks, " in Proc. IEEE TENCON, Oct./Nov. 2007, pp. 1-4.
-
(2007)
Proc. IEEE TENCON
, pp. 1-4
-
-
Sun, H.-M.1
Chen, C.-M.2
Hsiao, Y.-C.3
-
26
-
-
0042475197
-
A framework for reliable routing in mobile ad hoc networks
-
Mar./Apr
-
Z. Ye, V. Krishnamurthy, and S. K. Tripathi, "A framework for reliable routing in mobile ad hoc networks, " in Proc. IEEE INFOCOM, Mar./Apr. 2003, pp. 270-280.
-
(2003)
Proc. IEEE INFOCOM
, pp. 270-280
-
-
Ye, Z.1
Krishnamurthy, V.2
Tripathi, S.K.3
-
27
-
-
33746375987
-
H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks
-
Jul
-
W. Lou and Y. Kwon, "H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks, " IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1320-1330, Jul. 2006.
-
(2006)
IEEE Trans. Veh. Technol
, vol.55
, Issue.4
, pp. 1320-1330
-
-
Lou, W.1
Kwon, Y.2
-
29
-
-
80055037954
-
A reliability-oriented transmission service in wireless sensor networks
-
Dec
-
Y. Liu, Y. Zhu, L. Ni, and G. Xue, "A reliability-oriented transmission service in wireless sensor networks, " IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 12, pp. 2100-2107, Dec. 2011.
-
(2011)
IEEE Trans. Parallel Distrib. Syst
, vol.22
, Issue.12
, pp. 2100-2107
-
-
Liu, Y.1
Zhu, Y.2
Ni, L.3
Xue, G.4
-
30
-
-
84856274467
-
Design and implementation of TARF: A trust-aware routing framework for WSNs
-
Mar./Apr
-
G. Zhan, W. Shi, and J. Deng, "Design and implementation of TARF: A trust-aware routing framework for WSNs, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 2, pp. 184-197, Mar./Apr. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput
, vol.9
, Issue.2
, pp. 184-197
-
-
Zhan, G.1
Shi, W.2
Deng, J.3
-
31
-
-
34548020232
-
Adaptive security design with malicious node detection in cluster-based sensor networks
-
M.-Y. Hsieh, Y.-M. Huang, and H.-C. Chao, "Adaptive security design with malicious node detection in cluster-based sensor networks, " Comput. Commun., vol. 30, nos. 11-12, pp. 2385-2400, 2007.
-
(2007)
Comput. Commun
, vol.30
, Issue.11-12
, pp. 2385-2400
-
-
Hsieh, M.-Y.1
Huang, Y.-M.2
Chao, H.-C.3
-
32
-
-
84863512174
-
ReTrust: Attack-resistant and lightweight trust management for medical sensor networks
-
Jul
-
D. He, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos, "ReTrust: Attack-resistant and lightweight trust management for medical sensor networks, " IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 4, pp. 623-632, Jul. 2012.
-
(2012)
IEEE Trans. Inf. Technol. Biomed
, vol.16
, Issue.4
, pp. 623-632
-
-
He, D.1
Chen, C.2
Chan, S.3
Bu, J.4
Vasilakos, A.V.5
-
33
-
-
84858068452
-
TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
-
F. G. Mármol and G. M. Pérez, "TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks, " J. Netw. Comput. Appl., vol. 35, no. 3, pp. 934-941, 2012.
-
(2012)
J. Netw. Comput. Appl
, vol.35
, Issue.3
, pp. 934-941
-
-
Mármol, F.G.1
Pérez, G.M.2
-
34
-
-
79960917485
-
SensorTrust: A resilient trust model for wireless sensing systems
-
G. Zhan, W. Shi, and J. Deng, "SensorTrust: A resilient trust model for wireless sensing systems, " Pervasive Mobile Comput., vol. 7, no. 4, pp. 509-522, 2012.
-
(2012)
Pervasive Mobile Comput
, vol.7
, Issue.4
, pp. 509-522
-
-
Zhan, G.1
Shi, W.2
Deng, J.3
-
35
-
-
50149105732
-
Impact of denial of service attacks on ad hoc networks
-
Aug
-
I. Aad, J.-P. Hubaux, and E. W. Knightly, "Impact of denial of service attacks on ad hoc networks, " IEEE-ACM Trans. Netw., vol. 16, no. 4, pp. 791-802, Aug. 2008.
-
(2008)
IEEE -ACM Trans. Netw
, vol.16
, Issue.4
, pp. 791-802
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
36
-
-
84927649723
-
Quantifying the severity of blackhole attack in wireless mobile adhoc networks
-
Berlin, Germany: Springer
-
S. Mandala, K. Jenni, A. Ngadi, M. Kamat, and Y. Coulibaly, "Quantifying the severity of blackhole attack in wireless mobile adhoc networks, " in Security in Computing and Communications. Berlin, Germany: Springer, 2014, pp. 57-67.
-
(2014)
Security in Computing and Communications
, pp. 57-67
-
-
Mandala, S.1
Jenni, K.2
Ngadi, A.3
Kamat, M.4
Coulibaly, Y.5
|