1 |
J. I. Vazquez et al., "Communication architectures and experiences for web-connected physical smart objects," in Proc.of 2010 IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 684-689, 2010.
|
2 |
L. Yan, Y. Zhang, Laurence, T. Yang, and H. Ning, "Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems," Auerbach Publications, 2008.
|
3 |
E. Renault, "Toward a security model for the future network of information," in Proc. of 4th International Conference on Ubiquitous Information Technologies & Applications, Dec. 2009.
|
4 |
Liang Zhou and Han-Chieh Chao, "Multimedia traffic security architecture for the internet of things," in Proc. of IEEE Network, vol. 25, pp. 35-40, 2011.
|
5 |
H. Ning, N. Ning, S. Qu, Y. Zhang, and H. Yang, "Layered structure and management in Internet of things," in Proc. of Future Generation Communication and Networking, vol. 2, pp. 386-389, Dec. 2007.
|
6 |
Georgios Tselentis, Alex Galis, Anastasius Gavras, Srdjan Krco, Volkmar Lotz, Elena Simperl, Burkhard Stiller and Theodore Zahariadis, "Towards the future Internet-emerging trends from European research", IOS Press, 2010.
|
7 |
Yun Wang and Kai Li, "Topology mining of sensor networks for smart home environments," International Journal of Ad Hoc and Ubiquitous Computing, vol. 7, no.3 pp. 163-173, 2011.
|
8 |
M. Ma and Y. Yang, "Adaptive triangular deployment algorithm for unattended mobile sensor networks," IEEE Transactions on Computers, vol. 56, no. 7, pp. 946-847, Jul. 2007.
|
9 |
L. Kong, X. Liu, Z. Li and M.-Y Wu, "Automatic barrier coverage formation with mobile sensor networks," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-5, May. 2010.
|
10 |
X. Xu, H. Jiang, L. Huang, H. Xu and M. Xiao, "A reputation - based revising scheme for localization in wireless sensor networks," in Proc. of IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, 2010.
|
11 |
H. Chen, Y.T. Chan, H.V. Poor and K. Sezaki, "Range-free localization with the radical line," in Proc. of IEEE International Conference on Communications (ICC), pp. 1-5, May. 2010.
|
12 |
Huang Y. M., Hsieh M. Y., Chao H. C., Hung S. H. and Park J. H., "Pervasive, secure access to a hierarchical sensor-based healthcare monitoring architecture in wireless heterogeneous networks," IEEE Journal on Selected Areas in Communications, vol. 27, pp. 400-411, 2009.
|
13 |
S. Article (CrossRef Link) Ganeriwal, Laura K. Balzano and Mani B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proc. of ACM Transactions on Sensor Networks (TOSN), vol. 4, no.3, May. 2008.
|
14 |
Mo Jamshidi, "From large scale systems to cyber-physical systems," Journal of Internet Technology, vol. 12, no. 3, pp. 367-374, 2011.
|
15 |
Y. Hong, K.-S. Lui and Y.-C. Wu, "HEA-Loc: A Robust localization algorithm for sensor networks of diversified topologies," in Proc. of IEEE on Wireless Communications and Networking Conference (WCNC), pp.1-6, Apr. 2010.
|
16 |
Yi-Wei Ma, Chin-Feng Lai, Chia-Cheng Hu, Ming-Chiao Chen and Yueh-Min Huang, "RFID-based seamless multimedia services for smart homes," International Journal of Internet Protocol Technology, vol. 4, no. 4, pp. 232-239, 2009.
DOI
ScienceOn
|
17 |
Q. Zhu, R. Wang, Q. Chen, Y. Liu and W. Qin, "IOT Gateway: bridging wireless sensor networks into Internet of things," in Proc. of International Conference on Embedded and Ubiquitous Computing (EUC), pp. 347-352, Dec. 2010.
|
18 |
Huansheng Ning and Ziou Wang, "Future Internet of things architecture: Like mankind neural system or social organization framework?," IEEE Communications Letters, vol. 15, pp. 461-463, 2011.
|
19 |
C. Zhu, L. Shu, T. Hara, L. Wang and S. Nishio, "A survey on mobile sensor networks," Osaka University, Technical Report, Aug. 2010.
|
20 |
ITU, "The Internet of Things," ITU International Reports, 2005.
|
21 |
"Internet of Things in 2020," in Proc. of INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro & Nanosystems Groups in co-operation with the RFID working Group of the EPoSS, 2008.
|
22 |
Qian Xiaocong and Zhang Jidong, "Study on the structure of "Internet of Things(IOT)" business operation support platform," in Proc. of 2010 12th IEEE International Conference on Communication Technology (ICCT), pp. 1068-1071, Nov. 2010.
|
23 |
F. Thiesse, C. Floerkemeier, M. Harrison, F. Michahelles and C. Roduner, "Technology, standards, and real-world deployments of the EPC network," in Proc. of IEEE Internet Computing, vol. 13, pp. 36-43, Mar. 2009.
|
24 |
G. Broll, et al., "Perci: pervasive serviceinteraction with the Internet of things," in Proc. of IEEE Internet Computing, vol. 13, pp. 74-81, Dec. 2009.
|
25 |
EPCglobal, "The EPCglobal architecture framework," final version 1.3, 2009.
|
26 |
J. P. Conti, "The Internet of things," in Proc. of Communication Engineering, vol. 4, pp. 20-25, 2006.
|
27 |
M.C. Fernandez-Gago, R. Roman and J. Lopez, "A survey on the applicability of trust management systems for wireless sensor networks," Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SECPerU, pp. 25-30, Jul. 2007.
|
28 |
X. Zhang, "Decentralized sensor-coordination optimization for mobile multi-target tracking in wireless sensor networks," in Proc. of IEEE Global Telecommunications Conference, pp. 1-5, Dec. 2010.
|
29 |
W. Jin and Z. Xi, "Sensor self-organization for mobile multi-target tracking in decentralized wireless sensor networks," IEEE Wireless Communications and Networking Conference (WCNC), pp. 1-6, Apr. 2010.
|
30 |
X. Wang, L. Ding and D. Bi, "Reputation-enabled self-modification for target sensing in wireless sensor networks," IEEE Transactions on Instrumentation and Measurement, vol. 59, no. 1, pp. 171-179, Jan. 2010.
|
31 |
R.A. Shaikh, H. Jameel, B.J. d'Auriol, H. Lee, S. Lee and Y.-J. Song, "Group-based trust management scheme for clustered wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1698-1712, Nov. 2009.
|
32 |
H. Deng, G. Jin, K. Sun, R. Xu, M. Lyell and J.A. Luke, "Trust-aware in-network aggregation for wireless sensor networks," IEEE Global Telecommunications Conference, pp. 1-8, Dec. 2009.
|
33 |
S. Chen, Y. Zhang; P. Liu and J. Feng, "Coping with traitor attacks in reputation models for wireless sensor networks," IEEE Global Telecommunications Conference , pp. 1-6, Dec. 2010.
|
34 |
R. Akbani, T. Korkmaz and G. Raju, "A machine learning based reputation system for defending against malicious node behavior," IEEE Global Telecommunications Conference, pp. 1-5, Dec. 4 2008.
|
35 |
C.Y. Chen, H.C. Chao, T.Y. Wu, C.I Fan, J.L. Chen, Y.S. Chen, and J.M. Hsu, "IoT-IMS communication platform for future Internet," Journal of Adaptive, Resilient and Autonomic Systems, IGI Global, vol. 2, no. 4, 2011.
|