社交物联网(SIoT)及其安全综述
摘要
本文对社交物联网(SIoT)及其安全进行了研究。
出处
《电子技术与软件工程》
2019年第6期192-193,共2页
ELECTRONIC TECHNOLOGY & SOFTWARE ENGINEERING
二级参考文献14
-
1McKnight D H, Chervany N L. What trust means in e-com- merce customer relationships: An interdisciplinary conceptual typology. International Journal of Electronic Commerce, 2001, 6(2): 35-59.
-
2Carbone M, Nielsen M, Sassone V. A formal model for trust in dynamic networks//Proceedings of the Software Engineer- ing and Formal Methods Conference. Brisbane, Australia, 2003:54-61.
-
3Blaze M, Feigenbaum J, Lacy J. Decentralized trust manage- ment//Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996:164-173.
-
4Resnick P, Kuwabara K, Zeckhauser R, Friedman E. Repu- tation systems. Communications of the ACM, 2000, 43 (12) : 45-48.
-
5Resnick P. Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system. The Eco nomics o~ the Internet and E-Commerce, Advances in Applied Microeconomics, 2002, 11:127-157.
-
6Josang A. The beta reputation system//Proceedings of the 15th Bled Electronic Commerce Conference. Beld, Slovenia, 2002:1-14.
-
7Jameel H, Kalim U, Sajjad A. A trust model for ubiquitous systems based on vectors of trust values//Proceedings of the 7th IEEE International Symposium on Multimedia (ISM' 05). Irvine, USA, 2005:674-679.
-
8Huang L, Li L, Tan Q. Behavior-based trust in wireless sensor network//Proceedings of the Advanced Web and Net- work Technologies, and Applications Conference. Berlin, Germany, 2006:214-223.
-
9Yu B. An evidential model of distributed reputation manage ment//Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems. Bologna, Italy, 2002:294-301.
-
10Song S, Hwang K, Macwan M. Fuzzy trust integration for security enforcement in grid computing//Proceedings of the IFIP International Conference on Network and Parallel Com- puting. Wuhan, China, 2004: 9-21.
共引文献18
-
1樊娜,赵祥模,王青龙.船联网数据融合的信任模型[J].交通运输工程学报,2013,13(3):121-126. 被引量:5
-
2徐晨.物联网与数控机床远程智能监控系统[J].组合机床与自动化加工技术,2013(8):86-90. 被引量:9
-
3马满福,张龙.物联网中基于网关的跨域信任模型[J].计算机工程与设计,2013,34(11):3829-3834. 被引量:4
-
4冯景瑜.协作频谱感知中的SSDF攻击及其对策研究[J].电信科学,2014,30(1):67-72. 被引量:5
-
5贾志强.物联网对计算机通信网络的影响分析[J].信息安全与技术,2015,6(1):32-34. 被引量:13
-
6郭理,秦怀斌,邵明文.基于物联网的农业生产过程智能控制架构研究[J].农机化研究,2014,36(8):193-195. 被引量:12
-
7沙乐天,何利文,傅建明,王延松,胡学理,牛小兵,李鹏伟,陈晶.物联网环境下的敏感信息保护方法[J].四川大学学报(工程科学版),2016,48(1):132-138. 被引量:6
-
8陈迪,周鸣争.物联网中基于跨层行为可信的访问控制机制[J].小型微型计算机系统,2016,37(9):2002-2006. 被引量:1
-
9徐雪飞,李建华,杨迎辉,郭蓉.基于云模型的军事航空通信频谱共享信任机制研究[J].计算机科学,2016,43(9):169-174.
-
10王慧强,温秀秀,吕宏武,冯光升,林俊宇.面向移动物联网的可信超网络概念及构架研究[J].计算机科学,2017,44(5):75-80. 被引量:2
-
1谷敏,鲍宜帆.关于物联网技术信息安全探讨[J].数字技术与应用,2019,37(2):199-199. 被引量:2
-
2胡君,莫峥嵘.水下传感网络中有效选择转发节点的协作路由[J].传感技术学报,2019,32(3):458-462. 被引量:3
-
3郝杰.面向物联网应用的短距离无线接入关键技术研究[J].电子设计工程,2019,27(9):88-91. 被引量:4
-
4余员琴,余修武,陈海文,陈芳.基于光纤传感网络的区域报警监测系统设计[J].激光杂志,2019,40(4):102-107. 被引量:2