-
1
-
-
84875496390
-
A survey on sensor-cloud: architecture, applications, and approaches
-
Alamri, A., Ansari, W.S., Hassan, M.M., Hossain, M.S., A survey on sensor-cloud: architecture, applications, and approaches. Int. J. Distrib. Sens. Netw., 2013(6), 2013, 18.
-
(2013)
Int. J. Distrib. Sens. Netw.
, vol.2013
, Issue.6
, pp. 18
-
-
Alamri, A.1
Ansari, W.S.2
Hassan, M.M.3
Hossain, M.S.4
-
2
-
-
78650497196
-
Sensor-cloud infrastructure - physical sensor management with virtualized sensors on cloud computing
-
International Conference on Network-Based Information Systems
-
M. Yuriyama, T. Kushida, Sensor-cloud infrastructure - physical sensor management with virtualized sensors on cloud computing, in: International Conference on Network-Based Information Systems, 2010, pp. 1–8.
-
(2010)
, pp. 1-8
-
-
Yuriyama, M.1
Kushida, T.2
-
3
-
-
85027683302
-
Dependable structural health monitoring using wireless sensor networks
-
Bhuiyan, M.Z.A., Wang, G., Wu, J., Cao, J., Liu, X., Wang, T., Dependable structural health monitoring using wireless sensor networks. IEEE Trans. Dependable Secure Comput. 14:4 (2017), 363–376.
-
(2017)
IEEE Trans. Dependable Secure Comput.
, vol.14
, Issue.4
, pp. 363-376
-
-
Bhuiyan, M.Z.A.1
Wang, G.2
Wu, J.3
Cao, J.4
Liu, X.5
Wang, T.6
-
4
-
-
85027442121
-
On theoretical modeling of sensor cloud: a paradigm shift from wireless sensor network
-
Misra, S., Chatterjee, S., Obaidat, M.S., On theoretical modeling of sensor cloud: a paradigm shift from wireless sensor network. IEEE Syst. J. 11:2 (2017), 1084–1093.
-
(2017)
IEEE Syst. J.
, vol.11
, Issue.2
, pp. 1084-1093
-
-
Misra, S.1
Chatterjee, S.2
Obaidat, M.S.3
-
5
-
-
84897093175
-
Sensor cloud: a cloud of virtual sensors
-
Madria, S., Kumar, V., Dalvi, R., Sensor cloud: a cloud of virtual sensors. IEEE Softw. 31:2 (2014), 70–77.
-
(2014)
IEEE Softw.
, vol.31
, Issue.2
, pp. 70-77
-
-
Madria, S.1
Kumar, V.2
Dalvi, R.3
-
6
-
-
85040682686
-
Fog-based storage technology to fight with cyber threat
-
Wang, T., Zhou, J., Huang, M., Bhuiyan, M., Liu, A., Xu, W., Xie, M., Fog-based storage technology to fight with cyber threat. Future Gener. Comput. Syst. 83 (2018), 208–218.
-
(2018)
Future Gener. Comput. Syst.
, vol.83
, pp. 208-218
-
-
Wang, T.1
Zhou, J.2
Huang, M.3
Bhuiyan, M.4
Liu, A.5
Xu, W.6
Xie, M.7
-
7
-
-
85040682831
-
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
-
Shen, J., Gui, Z., Ji, S., Shen, J., Tan, H., Tang, Y., Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks. J. Netw. Comput. Appl. 106 (2018), 117–123.
-
(2018)
J. Netw. Comput. Appl.
, vol.106
, pp. 117-123
-
-
Shen, J.1
Gui, Z.2
Ji, S.3
Shen, J.4
Tan, H.5
Tang, Y.6
-
8
-
-
85070851178
-
Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network
-
Gao, C.Z., Cheng, Q., Li, X., Xia, S.B., Cloud-assisted privacy-preserving profile-matching scheme under multiple keys in mobile social network. Cluster Comput., 2018, 1–9.
-
(2018)
Cluster Comput.
, pp. 1-9
-
-
Gao, C.Z.1
Cheng, Q.2
Li, X.3
Xia, S.B.4
-
9
-
-
85042177655
-
Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures
-
Xu, J., Wei, L., Zhang, Y., Wang, A., Zhou, F., Gao, C.Z., Dynamic fully homomorphic encryption-based merkle tree for lightweight streaming authenticated data structures. J. Netw. Comput. Appl. 107 (2018), 113–124.
-
(2018)
J. Netw. Comput. Appl.
, vol.107
, pp. 113-124
-
-
Xu, J.1
Wei, L.2
Zhang, Y.3
Wang, A.4
Zhou, F.5
Gao, C.Z.6
-
10
-
-
85018267100
-
Optimization coverage conserving protocol with authentication in wireless sensor networks
-
155014771769556
-
Sun, Z., Li, L., Li, X., Xing, X., Li, Y., Optimization coverage conserving protocol with authentication in wireless sensor networks. Int. J. Distrib. Sens. Netw., 13(3), 2017 155014771769556.
-
(2017)
Int. J. Distrib. Sens. Netw.
, vol.13
, Issue.3
-
-
Sun, Z.1
Li, L.2
Li, X.3
Xing, X.4
Li, Y.5
-
11
-
-
85027927161
-
Security in the integration of low-power wireless sensor networks with the internet: a survey
-
Granjal, J., Monteiro, E., Silva, J.S., Security in the integration of low-power wireless sensor networks with the internet: a survey. Ad Hoc Netw. 24 (2015), 264–287.
-
(2015)
Ad Hoc Netw.
, vol.24
, pp. 264-287
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.S.3
-
12
-
-
85041446395
-
Data reduction for a smart citys critical infrastructural health monitoring
-
Wang, T., Bhuiyan, M.Z.A., Wang, G., Rahman, M.A., Wu, J., Cao, J., Data reduction for a smart citys critical infrastructural health monitoring. IEEE Commun. Mag. 56:3 (2018), 128–133.
-
(2018)
IEEE Commun. Mag.
, vol.56
, Issue.3
, pp. 128-133
-
-
Wang, T.1
Bhuiyan, M.Z.A.2
Wang, G.3
Rahman, M.A.4
Wu, J.5
Cao, J.6
-
13
-
-
85053770626
-
Data collection from WSNs to the cloud based on mobile Fog elements
-
Wang, T., Zeng, J., Lai, Y., Cai, Y., Tian, H., Chen, Y., Wang, B., Data collection from WSNs to the cloud based on mobile Fog elements. Future Gener. Comput. Syst., 2017.
-
(2017)
Future Gener. Comput. Syst.
-
-
Wang, T.1
Zeng, J.2
Lai, Y.3
Cai, Y.4
Tian, H.5
Chen, Y.6
Wang, B.7
-
14
-
-
84953355723
-
A trust aware routing protocol for energy constrained wireless sensor network
-
Ahmed, A., Bakar, K.A., Channa, M.I., Haseeb, K., Khan, A.W., A trust aware routing protocol for energy constrained wireless sensor network. Telecommun. Syst. 61:1 (2016), 123–140.
-
(2016)
Telecommun. Syst.
, vol.61
, Issue.1
, pp. 123-140
-
-
Ahmed, A.1
Bakar, K.A.2
Channa, M.I.3
Haseeb, K.4
Khan, A.W.5
-
15
-
-
84891933258
-
Management and applications of trust in wireless sensor networks: a survey
-
Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.C., Management and applications of trust in wireless sensor networks: a survey. J. Comput. System Sci. 80:3 (2014), 602–617.
-
(2014)
J. Comput. System Sci.
, vol.80
, Issue.3
, pp. 602-617
-
-
Han, G.1
Jiang, J.2
Shu, L.3
Niu, J.4
Chao, H.C.5
-
16
-
-
84927602818
-
An efficient distributed trust model for wireless sensor networks
-
Jiang, J., Han, G., Wang, F., Shu, L., An efficient distributed trust model for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 26:5 (2015), 1228–1237.
-
(2015)
IEEE Trans. Parallel Distrib. Syst.
, vol.26
, Issue.5
, pp. 1228-1237
-
-
Jiang, J.1
Han, G.2
Wang, F.3
Shu, L.4
-
17
-
-
85088614279
-
Comprehensive trustworthy data collection approach in sensor-cloud system
-
IEEE Transactions on Big Data
-
Wang, T., Li, Y., Fang, W., Xu, W., Liang, J., Chen, Y., Liu, X., Comprehensive trustworthy data collection approach in sensor-cloud system. 2018, IEEE Transactions on Big Data.
-
(2018)
-
-
Wang, T.1
Li, Y.2
Fang, W.3
Xu, W.4
Liang, J.5
Chen, Y.6
Liu, X.7
-
18
-
-
85018906248
-
Multi-key privacy-preserving deep learning in cloud computing
-
Li, P., Li, J., Huang, Z., Li, T., Gao, C.Z., Yiu, S.M., Chen, K., Multi-key privacy-preserving deep learning in cloud computing. Future Gener. Comput. Syst. 74:C (2017), 76–85.
-
(2017)
Future Gener. Comput. Syst.
, vol.74
, Issue.100
, pp. 76-85
-
-
Li, P.1
Li, J.2
Huang, Z.3
Li, T.4
Gao, C.Z.5
Yiu, S.M.6
Chen, K.7
-
19
-
-
84957690302
-
Improved TOPSIS method based trust evaluation framework for determining trustworthiness of cloud service providers
-
Sidhu, J., Singh, S., Improved TOPSIS method based trust evaluation framework for determining trustworthiness of cloud service providers. J. Grid Comput. 15:1 (2016), 1–25.
-
(2016)
J. Grid Comput.
, vol.15
, Issue.1
, pp. 1-25
-
-
Sidhu, J.1
Singh, S.2
-
20
-
-
84942064617
-
Hybrid model for dynamic evaluation of trust in cloud services
-
Rajendran, V.V., Swamynathan, S., Hybrid model for dynamic evaluation of trust in cloud services. Wirel. Netw. 22:6 (2016), 1–12.
-
(2016)
Wirel. Netw.
, vol.22
, Issue.6
, pp. 1-12
-
-
Rajendran, V.V.1
Swamynathan, S.2
-
21
-
-
84925450955
-
Flavio Milito, Fog computing: a platform for internet of things and analytics
-
Big data and internet of things: A roadmap for smart environments
-
R.N.P.Z.J. Bonomi, Flavio Milito, Fog computing: a platform for internet of things and analytics, in: Big data and internet of things: A roadmap for smart environments, 2014, pp. 169–186.
-
(2014)
, pp. 169-186
-
-
Bonomi, R.N.P.Z.J.1
-
22
-
-
84975797315
-
A sensor cloud architecture for healthcare applications
-
ACM Symposium on Applied Computing
-
M.J. Guezguez, S. Rekhis, N. Boudriga, A sensor cloud architecture for healthcare applications, in: ACM Symposium on Applied Computing, 2016, pp. 612–617.
-
(2016)
, pp. 612-617
-
-
Guezguez, M.J.1
Rekhis, S.2
Boudriga, N.3
-
23
-
-
85012050732
-
Sensing-cloud: leveraging the benefits for agricultural applications
-
Ojha, T., Misra, S., Raghuwanshi, N.S., Sensing-cloud: leveraging the benefits for agricultural applications. Comput. Electron. Agric. 135 (2017), 96–107.
-
(2017)
Comput. Electron. Agric.
, vol.135
, pp. 96-107
-
-
Ojha, T.1
Misra, S.2
Raghuwanshi, N.S.3
-
24
-
-
84883262576
-
Trust management in cloud-integrated wireless sensor networks
-
International Conference on Collaboration Technologies and Systems
-
O. Savas, G. Jin, J. Deng, Trust management in cloud-integrated wireless sensor networks, in: International Conference on Collaboration Technologies and Systems, 2013, pp. 334–341.
-
(2013)
, pp. 334-341
-
-
Savas, O.1
Jin, G.2
Deng, J.3
-
25
-
-
84919816091
-
An authenticated trust and reputation calculation and management system for cloud and sensor networks integration
-
Zhu, C., Nicanfar, H., Leung, V.C.M., Yang, L.T., An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans. Inf. Forensics Secur. 10:1 (2014), 118–131.
-
(2014)
IEEE Trans. Inf. Forensics Secur.
, vol.10
, Issue.1
, pp. 118-131
-
-
Zhu, C.1
Nicanfar, H.2
Leung, V.C.M.3
Yang, L.T.4
-
26
-
-
85088614075
-
Trust assistance in sensor-cloud
-
Computer Communications Workshops.
-
C. Zhu, V.C.M. Leung, L.T. Yang, L. Shu, J.J.P.C. Rodrigues, X. Li, Trust assistance in sensor-cloud, in: Computer Communications Workshops, 2015.
-
(2015)
-
-
Zhu, C.1
Leung, V.C.M.2
Yang, L.T.3
Shu, L.4
Rodrigues, J.J.P.C.5
Li, X.6
-
27
-
-
84930362469
-
A trust point-based security architecture for sensor data in the cloud
-
Henze, M., Hummen, R., Matzutt, R., Wehrle, K., A trust point-based security architecture for sensor data in the cloud. Trusted Cloud Comput., 2014, 77–106.
-
(2014)
Trusted Cloud Comput.
, pp. 77-106
-
-
Henze, M.1
Hummen, R.2
Matzutt, R.3
Wehrle, K.4
-
28
-
-
84862138560
-
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
-
Bao, F., Chen, I.R., Chang, M.J., Cho, J.H., Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9:2 (2012), 169–183.
-
(2012)
IEEE Trans. Netw. Serv. Manag.
, vol.9
, Issue.2
, pp. 169-183
-
-
Bao, F.1
Chen, I.R.2
Chang, M.J.3
Cho, J.H.4
-
29
-
-
85010748896
-
Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks
-
Prabha, V.R., Latha, P., Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks. Sdhan 42:2 (2017), 1–9.
-
(2017)
Sdhan
, vol.42
, Issue.2
, pp. 1-9
-
-
Prabha, V.R.1
Latha, P.2
-
30
-
-
85043761469
-
A survey on trust models in cloud computing
-
Gokulnath, K., Uthariaraj, R., A survey on trust models in cloud computing. Indian J. Sci. Technol., 9(47), 2016.
-
(2016)
Indian J. Sci. Technol.
, vol.9
, Issue.47
-
-
Gokulnath, K.1
Uthariaraj, R.2
-
31
-
-
84866627419
-
Fog computing and its role in the internet of things
-
Edition of the Mcc Workshop on Mobile Cloud Computing
-
F. Bonomi, R. Milito, J. Zhu, S. Addepalli, Fog computing and its role in the internet of things, in: Edition of the Mcc Workshop on Mobile Cloud Computing, 2012, pp. 13–16.
-
(2012)
, pp. 13-16
-
-
Bonomi, F.1
Milito, R.2
Zhu, J.3
Addepalli, S.4
-
32
-
-
84996757871
-
Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing
-
ACM
-
Rodero-Merino, L., Rodero-Merino, L., Finding your Way in the Fog: Towards a Comprehensive Definition of Fog Computing. 2014, ACM, 27–32.
-
(2014)
, pp. 27-32
-
-
Rodero-Merino, L.1
Rodero-Merino, L.2
-
33
-
-
84857860482
-
A ladder diffusion algorithm using ant colony optimization for wireless sensor networks
-
Ho, J.H., Shih, H.C., Liao, B.Y., Chu, S.C., A ladder diffusion algorithm using ant colony optimization for wireless sensor networks. Inform. Sci. 192:6 (2012), 204–212.
-
(2012)
Inform. Sci.
, vol.192
, Issue.6
, pp. 204-212
-
-
Ho, J.H.1
Shih, H.C.2
Liao, B.Y.3
Chu, S.C.4
|