APIS: Privacy-preserving incentive for sensing task allocation in cloud and edge-cooperation mobile Internet of Things with SDN

Q Xu, Z Su, M Dai, S Yu - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
The popularization of mobile devices connected to the network promotes the rise and
development of the emerging mobile Internet of Things (MIoT). Crowdsensing is a promising …

Resilient consensus with mobile detectors against malicious attacks

C Zhao, J He, J Chen - IEEE Transactions on Signal and …, 2017 - ieeexplore.ieee.org
This paper investigates the problem of resilient consensus under malicious attacks for
multiagent systems. Compared with most of existing works, a more general attack model is …

Load-balanced data dissemination for wireless sensor networks: A nature-inspired approach

X Liu, T Qiu, T Wang - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
The traditional many-to-one transmission pattern allows all sensor nodes to propagate their
packets toward a single sink in wireless sensor networks, resulting in imbalanced energy …

[HTML][HTML] A trust-based secure routing scheme using the traceback approach for energy-harvesting wireless sensor networks

J Tang, A Liu, J Zhang, NN Xiong, Z Zeng, T Wang - Sensors, 2018 - mdpi.com
The Internet of things (IoT) is composed of billions of sensing devices that are subject to
threats stemming from increasing reliance on communications technologies. A Trust-Based …

Pipeline slot based fast rerouting scheme for delay optimization in duty cycle based M2M communications

Q Li, A Liu, T Wang, M Xie, NN Xiong - Peer-to-Peer Networking and …, 2019 - Springer
In recent years, with the development of networked Cyber-Physical Systems (CPSs),
wireless sensor networks (WSNs), as an important carrier of CPSs, has been applied more …

A prediction system of Sybil attack in social network using deep-regression model

M Al-Qurishi, M Alrubaian, SMM Rahman… - Future Generation …, 2018 - Elsevier
Sybil attacks have grown prevalent in Twitter and other social networks owing to the
increase in the number of users now found on these very popular platforms. Sybil accounts …

An exchange market approach to mobile crowdsensing: pricing, task allocation, and walrasian equilibrium

S He, DH Shin, J Zhang, J Chen… - IEEE Journal on Selected …, 2017 - ieeexplore.ieee.org
Pricing and task allocation are vital to improving the efficiency in mobile crowdsensing, an
emerging human-in-the-loop application paradigm. Previous studies focused on incentive …

Small-cell assisted secure traffic offloading for narrowband Internet of Thing (NB-IoT) systems

X Yang, X Wang, Y Wu, LP Qian, W Lu… - IEEE Internet of things …, 2017 - ieeexplore.ieee.org
As cellular networks are evolving toward the fifth generation/long-term evolution systems,
cellular radio access networks are expected to provide high throughput and reliable …

A trust-evaluation-enhanced blockchain-secured industrial IoT system

D Wu, N Ansari - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT), allowing direct wireless communications between
industrial machines and people, is the key component of Industry 4.0. By grouping several …

[HTML][HTML] Differentiated data aggregation routing scheme for energy conserving and delay sensitive wireless sensor networks

X Li, W Liu, M Xie, A Liu, M Zhao, NN Xiong, M Zhao… - Sensors, 2018 - mdpi.com
Data aggregation is a widely adopted method to effectively reduce the data transmission
volume and improve the lifetime of wireless sensor networks (WSNs). In the data …