Computer Science ›› 2019, Vol. 46 ›› Issue (6): 153-161.doi: 10.11896/j.issn.1002-137X.2019.06.023
Previous Articles Next Articles
ZHANG Guang-hua1,2, YANG Yao-hong1, ZHANG Dong-wen1, LI Jun3
CLC Number:
[1]ZHANG Y Q,ZHOU W,PENG A N.Survey of Internet of Things Security [J].Journal of Computer Research and Deve-lopment,2017,54(10):2130-2143.(in Chinese) 张玉清,周威,彭安妮.物联网安全综述[J].计算机研究与发展,2017,54(10):2130-2143. [2]LIN J,YU W,ZHANG N,et al.A Survey on Internet of Things:Architecture,Enabling Technologies,Security and Privacy,and Applications[J].IEEE Internet of Things Journal,2017,4(5):1125-1142. [3]ISLAM S M R,KWAK D,KABIR M H,et al.The Internet of Things for Health Care:A Comprehensive Survey [J].IEEE Access,2017,3:678-708. [4]KURT M N,YILMAZ Y,WANG X.Distributed Quickest Detection of Cyber-Attacks in Smart Grid [J].IEEE Transactions on Information Forensics and Security,2018,13(99):1-16. [5]ALFONSO V,JAMES F H,HUNG L H,et al.Predicts 2015:The Internet of Things[EB/OL].(2014-12-30) [2018-07-28].https://www.gartner.com/doc/2952822/predicts-internet-things. [6]KSHIRSAGAR V H,KANTHE A M,SIMUNIC D.Trust Based Detection and Elimination of Packet Drop Attack in the Mobile Ad-Hoc Networks [J].Wireless Personal Communications,2018,100(2):311-320. [7]HAN G,JIANG J,SHU L,et al.Management and Applications of Trust in Wireless Sensor Networks:A survey [J].Journal of Computer and System Sciences,2014,80(3):602-617. [8]BAO F,CHEN I R,CHANG M,et al,Hierarchical Trust Mana-gement for Wireless Sensor Networks and Its Application to Trust-based Routing [C]∥Proceedings of ACM Symposium on Applied Computing.Taiwan:ACM,2011,1732-1738. [9]BAO F,CHEN I R,CHANG M J,et al.Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection [J].IEEE Transactions on Network & Service Management,2012,9(2):169-183. [10]HE D,CHEN C,CHAN S,et al.ReTrust:Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks [J].IEEE Transactions on Information Technology in Biomedicine,2012,16(4):623-632. [11]YANG B,YAMAMOTO R,TANAKA Y.Dempster-Shafer Evi-dence Theory based Trust Management Strategy against Coo-perative Black Hole Attacks and Gray Hole Attacks in MANETs[C]∥16th International Conference on Advanced Communi-cation Technology.Pyeongchang:IEEE,2014:223-232. [12]WANG B,CHEN X,CHANG W.A Light-weight Trust-based QoS Routing Algorithm for Ad Hoc Networks [J].Pervasive and Mobile Computing,2014,13(2014):164-180. [13]BAO F,CHEN I R.Trust Management for the Internet of Things and Its Application to Service Composition [C]∥2012 IEEE International Symposium on a World of Wireless,Mobile and Multimedia Networks (WoWMoM).San Francisco:IEEE,2012:1-6. [14]YAN Z,ZHANG P,VASILAKOS A V.A Survey on Trust Management for Internet of Things [J].Journal of Network and Computer Applications,2014,42(3):120-134. [15]KARKAZIS P,LELIGOU H C,SARAKIS L,et al.Design of Primary and Composite Routing Metrics for RPL-compliant Wireless Sensor Networks [C]∥2012 International Conference on Telecommunications and Multimedia (TEMU).Chania:IEEE,2012:13-18. [16]SEEBER S,SEHGAL A,STELTE B,et al.Towards a Trust Computing Architecture for RPL in Cyber Physical Systems [C]∥Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).Zurich:IEEE,2013:134-137. [17]DJEDJIG N,TANDJAOUI D,MEDJEK F.Trust-based RPL for the Internet of Things [C]∥2015 IEEE Symposium on Computers and Communication (ISCC).Larnaca:IEEE,2016:962-967. [18]KHAN Z A,HERRMANN P.A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things [C]∥2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA).Taipei:IEEE,2017:1169-1176. [19]KHAN Z A,ULLRICH J,VOYIATZIS A G,et al.A Trust-based Resilient Routing Mechanism for the Internet of Things [C]∥Proceedings of the 12th International Conference on Availability,Reliability and Security (ARES’17).Reggio Calabria:ACM,2017:1-6. [20]THUBERT P,WINTER T,BRANDT A,et al.RPL:IPv6 Routing Protocol for Low power and Lossy Networks [J].Internet Requests for Comment,2012,6550(5):853-861. [21]LUO J,LIU X,FAN M.A Trust Model based on Fuzzy Recommendation for Mobile Ad-hoc Networks [J].Computer Networks,2009,53(14):2396-2407. [22]ZHOU Z P,SHAO N N.An Improved Trust Evaluation Model Based on Bayesian for WSNs [J].Chinese Journal of Sensors and Actuators,2016,29(6):927-933.(in Chinese) 周治平,邵楠楠.基于贝叶斯的改进WSNs信任评估模型[J].传感技术学报,2016,29(6):927-933. [23]WU G,DU Z,HU Y,et al.A Dynamic Trust Model Exploiting the Time Slice in WSNs [J].Soft Computing,2014,18(9):1829-1840. [24]VASSEUR J P,KIM M,PISTER K,et al.Routing Metrics Used for Path Calculation in Low-Power and Lossy Networks [S/OL].[2018-07-28].https://tools.ietf.org/pdf/rfc6551.pdf. [25]OSTERLIND F,DUNKELS A,ERIKSSON J,et al.Cross-Level Sensor Network Simulation with COOJA [C]∥Proceedings.2006 31st IEEE Conference on Local Computer Networks.Tampa:IEEE,2011:641-648. [26]QASEM M,ALTAWSSI H,YASSIEN M B,et al.Performance Evaluation of RPL Objective Functions [C]∥IEEE Internatio-nal Conference on Computer and Information Technology;Ubiquitous Computing and Communications;Dependable,Autonomic and Secure Computing;Pervasive Intelligence and Computing.Liverpool:IEEE,2015:1606-1613. |
[1] | ZHANG Chong-yu, CHEN Yan-ming, LI Wei. Task Offloading Online Algorithm for Data Stream Edge Computing [J]. Computer Science, 2022, 49(7): 263-270. |
[2] | ZHANG Xi-ran, LIU Wan-ping, LONG Hua. Dynamic Model and Analysis of Spreading of Botnet Viruses over Internet of Things [J]. Computer Science, 2022, 49(6A): 738-743. |
[3] | DONG Dan-dan, SONG Kang. Performance Analysis on Reconfigurable Intelligent Surface Aided Two-way Internet of Things Communication System [J]. Computer Science, 2022, 49(6): 19-24. |
[4] | Ran WANG, Jiang-tian NIE, Yang ZHANG, Kun ZHU. Clustering-based Demand Response for Intelligent Energy Management in 6G-enabled Smart Grids [J]. Computer Science, 2022, 49(6): 44-54. |
[5] | ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun. New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [J]. Computer Science, 2022, 49(3): 329-337. |
[6] | YANG Yu-li, LI Yu-hang, DENG An-hua. Trust Evaluation Model of Cloud Manufacturing Services for Personalized Needs [J]. Computer Science, 2022, 49(3): 354-359. |
[7] | LI Bei-bei, SONG Jia-rui, DU Qing-yun, HE Jun-jiang. DRL-IDS:Deep Reinforcement Learning Based Intrusion Detection System for Industrial Internet of Things [J]. Computer Science, 2021, 48(7): 47-54. |
[8] | LI Jia-ming, ZHAO Kuo, QU Ting, LIU Xiao-xiang. Research and Analysis of Blockchain Internet of Things Based on Knowledge Graph [J]. Computer Science, 2021, 48(6A): 563-567. |
[9] | WANG Xi-long, LI Xin, QIN Xiao-lin. Collaborative Scheduling of Source-Grid-Load-Storage with Distributed State Awareness UnderPower Internet of Things [J]. Computer Science, 2021, 48(2): 23-32. |
[10] | WANG Wei-hong, CHEN Zhen-yu. Intelligent Manufacturing Security Model Based on Improved Blockchain [J]. Computer Science, 2021, 48(2): 295-302. |
[11] | LIU Xin, HUANG Yuan-yuan, LIU Zi-ang, ZHOU Rui. IoTGuardEye:A Web Attack Detection Method for IoT Services [J]. Computer Science, 2021, 48(2): 324-329. |
[12] | LIU Wei, RUAN Min-jie, SHE Wei, ZHANG Zhi-hong, TIAN Zhao. PBFT Optimized Consensus Algorithm for Internet of Things [J]. Computer Science, 2021, 48(11): 151-158. |
[13] | LIANG Jun-bin, TIAN Feng-sen, JIANG Chan, WANG Tian-shu. Survey on Task Offloading Techniques for Mobile Edge Computing with Multi-devices and Multi-servers in Internet of Things [J]. Computer Science, 2021, 48(1): 16-25. |
[14] | GAO Ji-xu, WANG Jun. Multi-edge Collaborative Computing Unloading Scheme Based on Genetic Algorithm [J]. Computer Science, 2021, 48(1): 72-80. |
[15] | XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225. |
|