References
- EPCglobal, "The EPCglobal architecture framework," final version 1.3, 2009.
- J. P. Conti, "The Internet of things," in Proc. of Communication Engineering, vol. 4, pp. 20-25, 2006.
- ITU, "The Internet of Things," ITU International Reports, 2005.
- "Internet of Things in 2020," in Proc. of INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro & Nanosystems Groups in co-operation with the RFID working Group of the EPoSS, 2008.
- Qian Xiaocong and Zhang Jidong, "Study on the structure of "Internet of Things(IOT)" business operation support platform," in Proc. of 2010 12th IEEE International Conference on Communication Technology (ICCT), pp. 1068-1071, Nov. 2010.
- F. Thiesse, C. Floerkemeier, M. Harrison, F. Michahelles and C. Roduner, "Technology, standards, and real-world deployments of the EPC network," in Proc. of IEEE Internet Computing, vol. 13, pp. 36-43, Mar. 2009.
- G. Broll, et al., "Perci: pervasive serviceinteraction with the Internet of things," in Proc. of IEEE Internet Computing, vol. 13, pp. 74-81, Dec. 2009.
- J. I. Vazquez et al., "Communication architectures and experiences for web-connected physical smart objects," in Proc.of 2010 IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 684-689, 2010.
- L. Yan, Y. Zhang, Laurence, T. Yang, and H. Ning, "Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems," Auerbach Publications, 2008.
- E. Renault, "Toward a security model for the future network of information," in Proc. of 4th International Conference on Ubiquitous Information Technologies & Applications, Dec. 2009.
- Liang Zhou and Han-Chieh Chao, "Multimedia traffic security architecture for the internet of things," in Proc. of IEEE Network, vol. 25, pp. 35-40, 2011.
- H. Ning, N. Ning, S. Qu, Y. Zhang, and H. Yang, "Layered structure and management in Internet of things," in Proc. of Future Generation Communication and Networking, vol. 2, pp. 386-389, Dec. 2007.
- Georgios Tselentis, Alex Galis, Anastasius Gavras, Srdjan Krco, Volkmar Lotz, Elena Simperl, Burkhard Stiller and Theodore Zahariadis, "Towards the future Internet-emerging trends from European research", IOS Press, 2010.
- Yun Wang and Kai Li, "Topology mining of sensor networks for smart home environments," International Journal of Ad Hoc and Ubiquitous Computing, vol. 7, no.3 pp. 163-173, 2011.
- Huang Y. M., Hsieh M. Y., Chao H. C., Hung S. H. and Park J. H., "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks," IEEE Journal on Selected Areas in Communications, vol. 27, pp. 400-411, 2009.
- S. Article (CrossRef Link) Ganeriwal, Laura K. Balzano and Mani B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proc. of ACM Transactions on Sensor Networks (TOSN), vol. 4, no.3, May. 2008.
- Mo Jamshidi, "From large scale systems to cyber-physical systems," Journal of Internet Technology, vol. 12, no. 3, pp. 367-374, 2011.
- Yi-Wei Ma, Chin-Feng Lai, Chia-Cheng Hu, Ming-Chiao Chen and Yueh-Min Huang, "RFID-based seamless multimedia services for smart homes," International Journal of Internet Protocol Technology, vol. 4, no. 4, pp. 232-239, 2009. https://doi.org/10.1504/IJIPT.2009.029272
- Q. Zhu, R. Wang, Q. Chen, Y. Liu and W. Qin, "IOT Gateway: bridging wireless sensor networks into Internet of things," in Proc. of International Conference on Embedded and Ubiquitous Computing (EUC), pp. 347-352, Dec. 2010.
- Huansheng Ning and Ziou Wang, "Future Internet of things architecture: Like mankind neural system or social organization framework?," IEEE Communications Letters, vol. 15, pp. 461-463, 2011.
- Y. Hong, K.-S. Lui and Y.-C. Wu, "HEA-Loc: A Robust localization algorithm for sensor networks of diversified topologies," in Proc. of IEEE on Wireless Communications and Networking Conference (WCNC), pp.1-6, Apr. 2010.
- C. Zhu, L. Shu, T. Hara, L. Wang and S. Nishio, "A survey on mobile sensor networks," Osaka University, Technical Report, Aug. 2010.
- M. Ma and Y. Yang, "Adaptive triangular deployment algorithm for unattended mobile sensor networks," IEEE Transactions on Computers, vol. 56, no. 7, pp. 946-847, Jul. 2007.
- L. Kong, X. Liu, Z. Li and M.-Y Wu, "Automatic barrier coverage formation with mobile sensor networks," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-5, May. 2010.
- X. Xu, H. Jiang, L. Huang, H. Xu and M. Xiao, "A reputation - based revising scheme for localization in wireless sensor networks," in Proc. of IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, 2010.
- H. Chen, Y.T. Chan, H.V. Poor and K. Sezaki, "Range-free localization with the radical line," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-5, May. 2010.
- X. Zhang, "Decentralized sensor-coordination optimization for mobile multi-target tracking in wireless sensor networks," in Proc. of IEEE Global Telecommunications Conference, pp. 1-5, Dec. 2010.
- W. Jin and Z. Xi, "Sensor self-organization for mobile multi-target tracking in decentralized wireless sensor networks," IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, Apr. 2010.
- X. Wang, L. Ding and D. Bi, "Reputation-enabled self-modification for target sensing in wireless sensor networks," IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 1, pp. 171-179, Jan. 2010.
- M.C. Fernandez-Gago, R. Roman and J. Lopez, "A survey on the applicability of trust management systems for wireless sensor networks," Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU, pp. 25-30, Jul. 2007.
- R.A. Shaikh, H. Jameel, B.J. d'Auriol, H. Lee, S. Lee and Y.-J. Song, "Group-based trust management scheme for clustered wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1698-1712, Nov. 2009.
- H. Deng, G. Jin, K. Sun, R. Xu, M. Lyell and J.A. Luke, "Trust-aware in-network aggregation for wireless sensor networks," IEEE Global Telecommunications Conference, pp. 1-8, Dec. 2009.
- S. Chen, Y. Zhang; P. Liu and J. Feng, "Coping with traitor attacks in reputation models for wireless sensor networks," IEEE Global Telecommunications Conference , pp. 1-6, Dec. 2010.
- R. Akbani, T. Korkmaz and G. Raju, "A machine learning based reputation system for defending against malicious node behavior," IEEE Global Telecommunications Conference, pp. 1-5, Dec. 4 2008.
- C.Y. Chen, H.C. Chao, T.Y. Wu, C.I Fan, J.L. Chen, Y.S. Chen, and J.M. Hsu, "IoT-IMS communication platform for future Internet," Journal of Adaptive, Resilient and Autonomic Systems, IGI Global, vol. 2, no. 4, 2011.
Cited by
- 키 전환이 필요 없는 완전 준동형 암호화 기법 vol.c38, pp.5, 2012, https://doi.org/10.7840/kics.2013.38c.5.428
- Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme vol.11, pp.11, 2012, https://doi.org/10.1155/2015/859731
- Intelligence in Ecology: How Internet of Things Expands Insights into the Missing CO2Sink vol.2016, pp.None, 2012, https://doi.org/10.1155/2016/4589723
- IoT 환경에서 컨텍스트 기반 적응적 멀티미디어 스트리밍 기법 vol.19, pp.7, 2012, https://doi.org/10.9717/kmms.2016.19.7.1166
- 스마트시티의 빅 센서 데이터와 빅 GIS 데이터를 융합하여 실시간 온라인 소음지도로 시각화하기 위한 분산병렬처리 방법론 vol.19, pp.4, 2018, https://doi.org/10.7472/jksii.2018.19.4.1
- A Distributed Trust Management Mechanism for the Internet of Things Using a Multi-Service Approach vol.103, pp.3, 2012, https://doi.org/10.1007/s11277-018-5942-8