과제정보
Authors are greatfully acknowledge the research supports received from Vels University, Chennai-600117, India.
참고문헌
- A.A. Anasane, & R.A. Satao, A survey on various multipath routing protocols in wireless sensor networks, Procedia Computer Science 79 (2016), 610-615. https://doi.org/10.1016/j.procs.2016.03.077
- T. Qiu, X. Liu, L. Feng, Y. Zhou, & K. Zheng, An efficient tree-based self-organizing protocol for internet of things, Ieee Access 4 (2016), 3535-3546. https://doi.org/10.1109/ACCESS.2016.2578298
- T. Qiu, Y. Lv, F. Xia, N. Chen, J. Wan, & A. Tolba, ERGID: An efficient routing protocol for emergency response Internet of Things, Journal of Network and Computer Applications 72 (2016), 104-112. https://doi.org/10.1016/j.jnca.2016.06.009
- S. Pundir, M. Wazid, D.P. Singh, A.K. Das, J.J. Rodrigues, & Y. Park, Intrusion detection protocols in wireless sensor networks integrated to Internet of Things deployment: Survey and future challenges, IEEE Access 8 (2019), 3343-3363. https://doi.org/10.1109/access.2019.2962829
- W.H. Hassan, Current research on Internet of Things (IoT) security: A survey, Computer networks 148 (2019), 283-294. https://doi.org/10.1016/j.comnet.2018.11.025
- S.K. Lee, M. Bae, & H. Kim, Future of IoT networks: A survey, Applied Sciences, 7 (2017), 1072.
- C. Stergiou, K.E. Psannis, B.G. Kim, & B. Gupta, Secure integration of IoT and cloud computing, Future Generation Computer Systems 78 (2018), 964-975. https://doi.org/10.1016/j.future.2016.11.031
- V.B. Reddy, A. Negi, & S. Venkataraman, Trust computation model using hysteresis curve for wireless sensor networks, In 2018 IEEE SENSORS, 2018, 1-4.
- A. Ahmed, K.A. Bakar, M.I. Channa, K. Haseeb, & A.W. Khan, TERP: A trust and energy aware routing protocol for wireless sensor network, IEEE Sensors Journal 15 (2015), 6962-6972. https://doi.org/10.1109/JSEN.2015.2468576
- X. Wu, J. Huang, J. Ling, & L. Shu, BLTM: beta and LQI based trust model for wireless sensor networks, IEEE Access 7 (2019), 43679-43690. https://doi.org/10.1109/access.2019.2905550
- M. Shen, B. Ma, L. Zhu, R. Mijumbi, X. Du, & J. Hu, Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection, IEEE Transactions on Information Forensics and Security 13 (2017), 940-953. https://doi.org/10.1109/tifs.2017.2774451
- S. Yao, Z. Li, J. Guan, & Y. Liu, Stochastic cost minimization mechanism based on identifier network for IoT security, IEEE Internet of Things Journal 7 (2019), 3923-3934. https://doi.org/10.1109/jiot.2019.2961839
- S. Singh, & J. Sidhu, Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers, Future Generation Computer Systems 67 (2017), 109-132. https://doi.org/10.1016/j.future.2016.07.013
- N. Somu, G.R. MR, K. Kirthivasan, & S.S. VS, A trust centric optimal service ranking approach for cloud service selection, Future Generation Computer Systems 86 (2018), 234-252. https://doi.org/10.1016/j.future.2018.04.033
- X. Li, Q. Wang, X. Lan, X. Chen, N. Zhang, & D. Chen, Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach, IEEE Access 7 (2019), 9368-9383. https://doi.org/10.1109/access.2018.2890432
- S. Siadat, A.M. Rahmani, & H. Navid, Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model, The Journal of Supercomputing 73 (2017), 2682-2704. https://doi.org/10.1007/s11227-016-1950-1
- Huang, Longtao, Shuiguang Deng, Ying Li, Jian Wu, Jianwei Yin, and Gexin Li, A trust evaluation mechanism for collaboration of data-intensive services in cloud, Applied Mathematics & Information Sciences 7 (2013), 121-129. https://doi.org/10.12785/amis/071L18
- Yasir Mehmoo, Ammar Oad, Muhammad Abrar et al., Edge Computing for IoT-Enabled Smart Grid.Security and communication networks, Hindawi 2021.
- Khan, Lalith, Devi, Rajalakshmi, A multi-attribute based trusted routing for embedded devices in MANET-IoT, Microprocessor and Microsystems, 2022. https://doi.org/10.1016/j.micpro.2022.104446