메뉴 건너뛰기




Volumn , Issue , 2013, Pages

Scalable, adaptive and survivable trust management for community of interest based internet of things systems

Author keywords

Adaptability; Internet of things; Performance analysis; Scalability; Social networks; Trust management

Indexed keywords

SCALABILITY; SOCIAL NETWORKING (ONLINE); TRUSTED COMPUTING;

EID: 85016075154     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISADS.2013.6513398     Document Type: Conference Paper
Times cited : (178)

References (30)
  • 1
    • 84857508468 scopus 로고    scopus 로고
    • Closed benchmarks for network community structure characterization
    • R. Aldecoa, and I. Marín, "Closed Benchmarks for Network Community Structure Characterization," Physical Review E, vol. 85, no. 2, 2012, pp. 026109-1 - 026109-8.
    • (2012) Physical Review E. , vol.85 , Issue.2 , pp. 0261091-0261098
    • Aldecoa, R.1    Marín, I.2
  • 2
    • 77956877124 scopus 로고    scopus 로고
    • The internet of things: A survey
    • Oct
    • L. Atzori, A. Iera, and G. Morabito, "The Internet of Things: A Survey," Computer Networks, vol. 54, no. 15, Oct. 2010, pp. 2787-2805.
    • (2010) Computer Networks , vol.54 , Issue.15 , pp. 2787-2805
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 3
    • 82155166351 scopus 로고    scopus 로고
    • SIoT: Giving a social structure to the internet of things
    • Nov
    • L. Atzori, A. Iera, and G. Morabito, "SIoT: Giving a Social Structure to the Internet of Things," IEEE Communication Letters, vol. 15, no. 11, Nov. 2011, pp. 1193-1195.
    • (2011) IEEE Communication Letters , vol.15 , Issue.11 , pp. 1193-1195
    • Atzori, L.1    Iera, A.2    Morabito, G.3
  • 4
  • 6
    • 84862138560 scopus 로고    scopus 로고
    • Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
    • F. Bao, I. R. Chen, M. Chang, and J. H. Cho, "Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrusion Detection," IEEE Transactions on Network and Service Management, vol. 9, no. 2, 2012, pp. 161-183.
    • (2012) IEEE Transactions on Network and Service Management , vol.9 , Issue.2 , pp. 161-183
    • Bao, F.1    Chen, I.R.2    Chang, M.3    Cho, J.H.4
  • 9
    • 84866346403 scopus 로고    scopus 로고
    • TRM-IoT: A trust management model based on fuzzy reputation for internet of things
    • Oct
    • D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X. Wang, "TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things," Computer Science and Information Systems, vol. 8, no. 4, Oct. 2011, pp. 1207-1228.
    • (2011) Computer Science and Information Systems , vol.8 , Issue.4 , pp. 1207-1228
    • Chen, D.1    Chang, G.2    Sun, D.3    Li, J.4    Jia, J.5    Wang, X.6
  • 10
    • 79551636196 scopus 로고    scopus 로고
    • Trust management for encounter-based routing in delay tolerant networks
    • Miami, Florida, USA, Dec
    • I. R. Chen, F. Bao, M. Chang, and J. H. Cho, "Trust Management for Encounter-Based Routing in Delay Tolerant Networks," IEEE Global Communications Conference, Miami, Florida, USA, Dec. 2010, pp. 1-6.
    • (2010) IEEE Global Communications Conference , pp. 1-6
    • Chen, I.R.1    Bao, F.2    Chang, M.3    Cho, J.H.4
  • 11
    • 0032121578 scopus 로고    scopus 로고
    • Performance analysis of admission control algorithms based on reward optimization for real-time multimedia servers
    • I. R. Chen, and T. H. Hsi, "Performance Analysis of Admission Control Algorithms Based on Reward Optimization for Real-Time Multimedia Servers," Performance Evaluation, vol. 33, no. 2, 1998, pp. 89-112.
    • (1998) Performance Evaluation , vol.33 , Issue.2 , pp. 89-112
    • Chen, I.R.1    Hsi, T.H.2
  • 12
    • 33746659142 scopus 로고    scopus 로고
    • Admission control algorithms for revenue optimization with QoS guarantees in mobile wireless networks
    • I. R. Chen, O. Yilmaz, and I. Yen, "Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks," Wireless Personal Communications, vol. 38, no. 3, 2006, pp. 357-376.
    • (2006) Wireless Personal Communications , vol.38 , Issue.3 , pp. 357-376
    • Chen, I.R.1    Yilmaz, O.2    Yen, I.3
  • 14
    • 0037645949 scopus 로고    scopus 로고
    • Dynamic quota-based admission control with sub-rating in multimedia servers
    • S. T. Cheng, C. M. Chen, and I. R. Chen, "Dynamic Quota-Based Admission Control with Sub-Rating in Multimedia Servers," Multimedia Systems, vol. 8, no. 2, 2000, pp. 83-91.
    • (2000) Multimedia Systems , vol.8 , Issue.2 , pp. 83-91
    • Cheng, S.T.1    Chen, C.M.2    Chen, I.R.3
  • 15
    • 0037350733 scopus 로고    scopus 로고
    • Performance evaluation of an admission control algorithm: Dynamic threshold with negotiation
    • S. T. Cheng, C. M. Chen, and I. R. Chen, "Performance Evaluation of an Admission Control Algorithm: Dynamic Threshold with Negotiation," Performance Evaluation, vol. 52, no. 1, 2003, pp. 1-13.
    • (2003) Performance Evaluation , vol.52 , Issue.1 , pp. 1-13
    • Cheng, S.T.1    Chen, C.M.2    Chen, I.R.3
  • 18
    • 79958007710 scopus 로고    scopus 로고
    • An internet of things-based personal device for diabetes therapy management in Ambient Assisted Living (AAL)
    • A. J. Jara, M. A. Zamora, and A. F. G. Skarmeta, "An Internet of Things-Based Personal Device for Diabetes Therapy Management in Ambient Assisted Living (AAL)," Personal and Ubiquitous Computing, vol. 15, no. 4, 2011, pp. 431-440.
    • (2011) Personal and Ubiquitous Computing , vol.15 , Issue.4 , pp. 431-440
    • Jara, A.J.1    Zamora, M.A.2    Skarmeta, A.F.G.3
  • 19
    • 77956055129 scopus 로고    scopus 로고
    • Power law and exponential decay of intercontact times between mobile devices
    • T. Karagiannis, J.-Y. Le Boudec, and M. Vojnović, "Power Law and Exponential Decay of Intercontact Times between Mobile Devices," IEEE Transactions on Mobile Computing, vol. 8, no. 10, 2007, pp. 1377-1390.
    • (2007) IEEE Transactions on Mobile Computing , vol.8 , Issue.10 , pp. 1377-1390
    • Karagiannis, T.1    Le Boudec, J.-Y.2    Vojnović, M.3
  • 20
    • 77953319755 scopus 로고    scopus 로고
    • Routing in socially selfish delay tolerant networks
    • San Diego, CA, March
    • Q. Li, S. Zhu, and G. Cao, "Routing in Socially Selfish Delay Tolerant Networks," IEEE Conference on Computer Communications, San Diego, CA, March 2010, pp. 1-9.
    • (2010) IEEE Conference on Computer Communications , pp. 1-9
    • Li, Q.1    Zhu, S.2    Cao, G.3
  • 22
    • 42149144140 scopus 로고    scopus 로고
    • Trust-aware recommender systems
    • Minneapolis, Minnesota, USA, Oct
    • P. Massa, and P. Avesani, "Trust-aware Recommender Systems," ACM Recommender Systems Conference, Minneapolis, Minnesota, USA, Oct. 2007.
    • (2007) ACM Recommender Systems Conference
    • Massa, P.1    Avesani, P.2
  • 25
    • 79960492499 scopus 로고    scopus 로고
    • QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things
    • July
    • W. Ren, "QoS-aware and compromise-resilient key management scheme for heterogeneous wireless Internet of Things," International Journal of Network Management, vol. 21, no. 4, July 2011, pp. 284-299.
    • (2011) International Journal of Network Management , vol.21 , Issue.4 , pp. 284-299
    • Ren, W.1
  • 26
    • 80052854156 scopus 로고    scopus 로고
    • Securing the internet of things
    • Sep
    • R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things," Computer, vol. 44, no. 9, Sep. 2011, pp. 51-58.
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 27
    • 4544328209 scopus 로고    scopus 로고
    • Admission control algorithms integrated with pricing for revenue optimization with QoS guarantees in mobile wireless networks
    • Newport Beach, USA, July
    • N. Verma, and I. R. Chen, "Admission Control Algorithms Integrated with Pricing for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks," IEEE 10th International Conference on Parallel and Distributed Systems, Newport Beach, USA, July 2004, pp. 495-502.
    • (2004) IEEE 10th International Conference on Parallel and Distributed Systems , pp. 495-502
    • Verma, N.1    Chen, I.R.2
  • 28
    • 58149488760 scopus 로고    scopus 로고
    • Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks
    • O. Yilmaz, and I. R. Chen, "Utilizing Call Admission Control for Pricing Optimization of Multiple Service Classes in Wireless Cellular Networks," Computer Communications, vol. 32, no. 2, 2009, pp. 317-323.
    • (2009) Computer Communications , vol.32 , Issue.2 , pp. 317-323
    • Yilmaz, O.1    Chen, I.R.2
  • 30
    • 79957583041 scopus 로고    scopus 로고
    • Multimedia traffic security architecture for the internet of things
    • May-June
    • L. Zhou, and H.-C. Chao, "Multimedia Traffic Security Architecture for the Internet of Things," IEEE Network, vol. 25, no. 3, May-June 2011, pp. 35-40.
    • (2011) IEEE Network , vol.25 , Issue.3 , pp. 35-40
    • Zhou, L.1    Chao, H.-C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.