|
[1] A. Ouaddah, I. Bouij-Pasquier, A. Abou Elkalam, and A. Ait Ouahman, “Security Analysis and Proposal of New Access Control Model in the Internet of Thing”, Electrical and Information Technologies (ICEIT), International Conference on, pp. 30-35, 2015. [2] J. Gole, and M. Cansfield, ‘‘M2M Moves Center Stage: Where Telcos Fit into the M2M Ecosystem,’’ IDC, Framingham, MA, USA, Tech. Rep. [Online]. Available: http://www.idc.com/getdoc.jsp?container Id=LM04U, 2012. [3] Z. Sheng, C. Mahapatra, C. Zhu, and V. C. M. Leung, “Recent Advances in Industrial Wireless Sensor Networks Toward Efficient Management in IoT”, IEEE Access, Special Section on Industrial Sensor Networks with Advanced Data Management: Design ad Security, Vol. 3, pp. 622-637, May 19, 2015. [4] Gu Lizet, Wang Jingpei, and Sun Bin, ”Trust Management Mechanism for Internet of Things”, China Communications, ICT Management, pp. 148-156, Feb. 2014. [5] A. Josang, R. Ismail, and C. Boyd, “A Survey of Trust and Reputation Systems for Online Service Provision”, Decision Support Systems, Vol. 43, pp. 618-644, 2007. [6] Jaemin Park_y, Kwangjo Kimy, “TM-Coin: Trustworthy Management of TCB Measurements in IoT”, 2nd IEEE Percom. Workshop On Security Privacy and Trust in The Internet of Things, pp. 654-659, 2017. [7] D. Chen, G. Chang, L. Jin, et al., “A Novel Secure Architecture for the Internet of Things”, 2011 Fifth International Conference on Genetic and Evolutionary Computing, pp. 311-314, 2011. [8] Z. Sheng, H. Wang, C. Yin, X. Hu, S. Yang, and V. C. M. Leung, ‘‘Lightweight Management of Resource Constrained Sensor Devices in Internet-of-Things,’’ IEEE Internet of Things Journal, Vol. 2, Issue: 5, pp. 402-411, 2015. [9] J. Lopez, R. Roman, I. Agudo, and C. Fernandez-Gago, “Trust Management Systems for Wireless Sensor Networks: Best Practices”, Computer Communications, Vol. 33, Issue 9, pp. 1086-1093, June 2010. [10] Gu Xiang, Qiu Jianlin, Wang Jin, “Research on Trust Model of Sensor Nodes in WSNs”, Procedia Engineering, Vol. 29, pp. 909-913, 2012. [11] S. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, "Security in Embedded Systems: Design Challenges," ACM Transactions on Embedded Computing Systems, Vol. 3, no. 3, pp. 461-491, 2004. [12] Ing-Ray Chen, Jia Guo, and Fenye Bao, “Trust Management for SOA-Based IoT and Its Application to Service Composition,” IEEE Trans. on Services Computing, Vol. 9, no. 3, May/June, 2016 [13] D. G. Brennan, “Linear Diversity Combining Techniques,” in Proc. IRE, Vol. 47, pp. 1075-1102, June 1959. [14] A. M. Kowshalya, M. L. Valarmathi, “Trust Management in the Social Internet of Things,” Wireless Personal Communications, Vol. 96, Issue 2, pp. 2681–2691, Sep. 2017. [15] S. Chakrabarty, and D. W. Engels, “A Secure IoT Architecture for Smart Cities,” 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), pp. 812 - 813, 2016. [16] H. Al-Hamadi, and Ing-Ray Chen, “Trust-Based Decision Making for Health IoT Systems,” IEEE Internet of Things Journal, Issue, 99, pp. 1-1, 2017. [17] Z. A. Khan, and P. Herrmann, “A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things,“ 2017 IEEE 31st International Conference on Advanced Information Networking and Applications, pp. 1169-1176, 2017. [18] L. Ma, Q. Pei, Y. Qu, K. Fan, and X. Lai, “Decentralized privacy preserving reputation management for mobile crowd sensing,” in Proc. Int. Conf. Security Privacy Commun. Syst., pp. 532-548, 2019. [19] T. Perera, et. al., “Blockchain-Based Product Traceability Beyond Proof of Existence,” Moratuwa Engineering Research Conference (MERCon), pp. 626-632, 2020. [20] Meng Shen, et. al., “Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT,” IEEE Journal on Selected Area in Commun., Vol. 38, no. 5, pp. 942-955, May, 2020 [21] A. Ukil, J. Sen, and S. Koilakonda, “Embedded Security for Internet of Things”, Emerging Trends and Applications in Computer Science (NCETACS), 2011 2nd National Conference on, pp. 1-6, 2011. [22] Z. Ali Khan, and P. Herrmann, “A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things,” 2017 IEEE 31st International Conference on Advanced Information Networking and Applications, pp. 1169-1176, 2017 IEEE [24] R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things," Computer, Vol. 44, pp. 51-58, 2011. [25] Serif Bahtiyar, Mehmet Ufuk Caglayan, “Extracting Trust Information from Security System of a Service”, Journal of Network and Computer Applications, Vol. 35, Issue 1, pp. 480-490, 2012. [26] Joy I.-Z. Chen, “An Algorithm of Mobile Sensors Data Fusion Tracking for Wireless Sensor Networks”, International Journal of Wireless Personal Commun., Vol. 58, no. 2, pp. 197-214, Dec. 2009. [27] K. A. Schaefer, D. Scheitrum, and K. Nes, “International Sourcing Decisions in the Wake of a Food Scandal,” Food Policy, Vol. 81, pp. 48–57, 2018. [28] A. thanasios Papoulis, and S. Unnikrishna Pillai, Probabilitty, Random Variables and Stochastic Processes, 4th Ed., Mc Graw Hill, New York, 2002. [29] I. S. Grodshteyn, I. M. Ryzhik, Table of Integrals, Series, and Products, 5th ed., CA: Academic Press, San Diego, 1994. [30] David, H. A., Order Statistics, New York: John Wiley & Sons, Inc., 1981. [31] Aston Zhang, Zachary C. Lipton, Mu Li, and Alexander J. Smola, Dive into Deep Learning, Release 0.8.0, Jun 16, 2020. [32] H Al-Hamadi, and Ing-Ray Chen, “Trust-Based Decision Making for Health IoT Systems,” IEEE Journal Internet of Things, 2017. [33]林谷陶,”區塊鏈技術及營建產業應用案例探討,內政部建築研究所自行研究報告”,中華民國 109 年 12 月成果報告。
|