- -

Internet of things: where to be is to trust

RiuNet: Institutional repository of the Polithecnic University of Valencia

Share/Send to

Cited by

Statistics

  • Estadisticas de Uso

Internet of things: where to be is to trust

Show full item record

Lacuesta, R.; Palacios-Navarro, G.; Cetina Englada, C.; Peñalver Herrero, ML.; Lloret, J. (2012). Internet of things: where to be is to trust. EURASIP Journal on Wireless Communications and Networking. (203):1-16. doi:10.1186/1687-1499-2012-203

Por favor, use este identificador para citar o enlazar este ítem: http://hdl.handle.net/10251/29749

Files in this item

Item Metadata

Title: Internet of things: where to be is to trust
Author: Lacuesta, Raquel Palacios-Navarro, Guillermo Cetina Englada, Carlos Peñalver Herrero, Mª Lourdes Lloret, Jaime
UPV Unit: Universitat Politècnica de València. Departamento de Comunicaciones - Departament de Comunicacions
Universitat Politècnica de València. Departamento de Informática de Sistemas y Computadores - Departament d'Informàtica de Sistemes i Computadors
Universitat Politècnica de València. Instituto de Investigación para la Gestión Integral de Zonas Costeras - Institut d'Investigació per a la Gestió Integral de Zones Costaneres
Issued date:
Abstract:
[EN] Networks' creation is getting more and more required, anytime, anywhere. Devices that can participate on these networks can be quite different among them. Sensors, mobiles, home appliances, or other type of devices ...[+]
Subjects: Internet of things , Trust , Network , Internet , Security
Copyrigths: Reconocimiento (by)
Source:
EURASIP Journal on Wireless Communications and Networking. (issn: 1687-1499 )
DOI: 10.1186/1687-1499-2012-203
Publisher:
SpringerOpen
Publisher version: http://link.springer.com/content/pdf/10.1186%2F1687-1499-2012-203.pdf
Type: Artículo

References

Lipnack J, Stamps J: Virtual Teams: Researching Across Space, Time, and Organizations with Technology. New York: John Wiley and Sons; 1997.

Ahuja MK, Carley KN: Network structure in virtual organizations, organization science, Vol. 10, No. 6, Special Issue: Communication Processes for Virtual Organizations, November–December. 1999, 741-757.

Mowshowitz A: Virtual organization. Commun ACM 1997, 40(9):30-37. 10.1145/260750.260759 [+]
Lipnack J, Stamps J: Virtual Teams: Researching Across Space, Time, and Organizations with Technology. New York: John Wiley and Sons; 1997.

Ahuja MK, Carley KN: Network structure in virtual organizations, organization science, Vol. 10, No. 6, Special Issue: Communication Processes for Virtual Organizations, November–December. 1999, 741-757.

Mowshowitz A: Virtual organization. Commun ACM 1997, 40(9):30-37. 10.1145/260750.260759

Preuß S: CH Cap, Overview of spontaneous networking-evolving concepts and technologies, in Rostocker Informatik-Berichte. Rostock: Fachbereich Informatik der Universit; 2000:113-123.

Feeney LM, Ahlgren B, Westerlund A: Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Commun Mag 2001, 39(6):176-181. 10.1109/35.925687

Latvakoski J, Pakkala D, Pääkkönen P: A communication architecture for spontaneous systems. IEEE Wirel Commun 2004, 11(3):36-42. 10.1109/MWC.2004.1308947

Mani M, Nguyen A-M, Crespi N: SCOPE: a prototype for spontaneous P2P social networking. Proceedings of 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) 2010, 220-225.

Legendre F, de Amorim MD, Fdida S: Implicit merging of overlapping spontaneous networks. Proceedings of Vehicular Technology Conference 2004, 3050-3054.

Zarate Silva VH, De Cruz Salgado EI, Ramos Quintana F: AWISPA: an awareness framework for collaborative spontaneous networks. 36th Annual Frontiers in Education Conference 2006, 27-31.

Perkins CE, Bhagwat P: Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM’94 1994, 234-244.

Johnson DB, Maltz DA, Broch J: DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Boston, MA: Ad Hoc Networking (Addison-Wesley Longman Publishing; 2001.

Perkins C, Belding-Royer E, Das S: Ad hoc on-demand distance vector (AODV) routing, RFC 3561. 2003.

Park V, Corson MS: IETF MANET Internet Draft “draft-ietf-MANET-tora-spe03.txt”, November 2000. 2012. Accessed March http://tools.ietf.org/html/draft-ietf-manet-tora-spec-03

Viana AC, De Amorim MD, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606. 10.1016/j.adhoc.2004.08.006

Lacuesta R, Peñalver L: IP addresses configuration in spontaneous networks. In Proceedings of the 9th WSEAS International Conference on Computers. Athens, Greece; 2005:1-6.

Alvarez-Hamelin JI, Viana AC, de Amorim M Dias: Architectural considerations for a self-configuring routing scheme for spontaneous networks, Technical Report 1. 2005.

Lacuesta R, Peñalver L: Automatic configuration of ad-hoc networks: establishing unique IP link-local addresses. In Proceedings of the International Conference on Emerging Security Information, Systems and Technologies (SECURWARE’07). Valencia, Spain; 2007:157-162.

Foulks EF: Social network therapies and society: an overview. Contemp Fam Therapy 1985, 3(4):316-320.

IBM: A Smarter Planet. 2012. http://www.ibm.com/smarterplanet

Montenegro G, Kushalnagar N, Hui J, Culler D: RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. 2007.

Alcaraz C, Najera P, Lopez J, Roman R: Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?, 1st International workshop on the security of The internet of Things (SecIoT). tokyo (Japan); 2010. . Accessed January 2012 1er International Workshop on the Security of The Internet of Things (SecIoT 2010) http://www.nics.uma.es/seciot10/files/pdf/alcaraz_seciot10_paper.pdf

Ferscha A, Davies N, Schmidt A, Streitz N: Pervasive Socio-Technical Fabric. Procedia Computer Science 2011, 7: 88-91.

Hubaux JP, Buttyán L, Capkun S: The quest for security in mobile ad-hoc networks, in Proceedings of the ACM Symposium on Mobile Ad-hoc Networking and Computing. 2001, 146-155.

Wang Y, Varadharajan V: Interaction trust evaluation in decentralized environments, e-commerce and web technologies. In Proceedings of 5th International Conference on Electronic Commerce and Web Technologies, vol LNCS 3182. Springer; 2004:144-153.

Jimin L, Junbao L, Aiguo A, Zhenpeng L: Two-way trust evaluation based on feedback. in Conference on Logistics Systems and Intelligent Management 2010, 3: 1910-1914.

Daskapan S, Nurtanti I, Van den Berg J: Trust algorithms in P2P file sharing networks. Int J Internet Technol Secured Trans 2010, 2(1–2):174-200.

Maña A, Koshutanski H, Pérez EJ: A trust negotiation based security framework for service provisioning in load-balancing clusters. Comput Secur 2012, 31(1):4-25. 10.1016/j.cose.2011.11.006

Stajano F, Anderson R: The resurrecting duckling security issues for ad-hoc wireless networks. Security Protocols, 7th International Workshop Proceedings, Lecture notes in Computer Science, LNCS 1296 1999, 172-194.

Balfanz D, Smetters DK, Stewart P, ChiWong H: Talking to strangers: authentication in ad-hoc wireless networks, in Symposium on Network and Distributed Systems Security (NDSS’02). San Diego, CA; 2002.

Capkun S, Hubaux JP, Buttyán L: Mobility helps security in ad-hoc networks. In Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. MD, USA: Annapolis; 2003:46-56.

Metzger MJ: Privacy, trust, and disclosure: exploring barriers to electronic commerce. J Comput-Mediat Commun 2004, 9(4). http://jcmc.indiana.edu/vol9/issue4/metzger.html 2004, 9(4).

[-]

recommendations

 

This item appears in the following Collection(s)

Show full item record