


default search action
IEEE Internet of Things Journal, Volume 1
Volume 1, Number 1, February 2014
- Chonggang Wang, Nei Kato

:
Inaugural Editorial. 1-2 - John A. Stankovic:

Research Directions for the Internet of Things. 3-9 - Tao Zhang, Hélder Antunes, Siddhartha Aggarwal:

Defending Connected Vehicles Against Malware: Challenges and a Solution Framework. 10-21 - Andrea Zanella, Nicola Bui

, Angelo Paolo Castellani, Lorenzo Vangelista
, Michele Zorzi:
Internet of Things for Smart Cities. 22-32 - Bingsheng Zhang

, Zhan Qin
, Si Chen
, Muyuan Li, Kui Ren
, Cong Wang
, Di Ma
:
PriWhisper: Enabling Keyless Secure Acoustic Communication for Smartphones. 33-45 - Chengzhe Lai, Hui Li, Xiaohui Liang

, Rongxing Lu, Kuan Zhang
, Xuemin Shen
:
CPAL: A Conditional Privacy-Preserving Authentication With Access Linkability for Roaming Service. 46-57 - Junqi Duan, Deyun Gao, Dong Yang, Chuan Heng Foh

, Hsiao-Hwa Chen:
An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications. 58-69 - Yu Wang, Shiwen Mao, R. Mark Nelms:

Distributed Online Algorithm for Optimal Real-Time Energy Distribution in the Smart Grid. 70-80 - Yan Chen, Feng Han, Yu-Han Yang, Hang Ma, Yi Han, Chunxiao Jiang, Hung-Quoc Lai, David Claffey, Zoltan Safar, K. J. Ray Liu

:
Time-Reversal Wireless Paradigm for Green Internet of Things: An Overview. 81-98 - Yi Liu, Chau Yuen, Xianghui Cao

, Naveed Ul Hassan, Jiming Chen:
Design of a Scalable Hybrid MAC Protocol for Heterogeneous M2M Networks. 99-111
Volume 1, Number 2, April 2014
- Jiong Jin

, Jayavardhana Gubbi, Slaven Marusic, Marimuthu Palaniswami
:
An Information Framework for Creating a Smart City Through Internet of Things. 112-121 - Ivan Stojmenovic:

Machine-to-Machine Communications With In-Network Data Aggregation, Processing, and Actuation for Large-Scale Cyber-Physical Systems. 122-128 - Qihui Wu, Guoru Ding

, Yuhua Xu, Shuo Feng, Zhiyong Du
, Jinlong Wang, Keping Long:
Cognitive Internet of Things: A New Paradigm Beyond Connection. 129-143 - Sara Amendola, Rossella Lodato, Sabina Manzari, Cecilia Occhiuzzi

, Gaetano Marrocco
:
RFID Technology for IoT-Based Personal Healthcare in Smart Spaces. 144-152 - Steven Lanzisera, Andrew R. Weber, Anna Liao, Dominic Pajak, Alan K. Meier

:
Communicating Power Supplies: Bringing the Internet to the Ubiquitous Energy Gateways of Electronic Devices. 153-160 - Tao Han, Nirwan Ansari

:
Offloading Mobile Traffic via Green Content Broker. 161-170 - Chong Tang, Lixing Song, Jagadeesh Balasubramani, Shaoen Wu, Saad Biaz, Qing Yang, Honggang Wang

:
Comparative Investigation on CSMA/CA-Based Opportunistic Random Access for Internet of Things. 171-179 - Stefano Savazzi

, Vittorio Rampa
, Umberto Spagnolini
:
Wireless Cloud Networks for the Factory of Things: Connectivity Modeling and Layout Design. 180-195 - Jun Huang

, Yu Meng, Xuehong Gong, Yanbing Liu, Qiang Duan:
A Novel Deployment Scheme for Green Internet of Things. 196-205
Volume 1, Number 3, June 2014
- Antonio Manuel Ortiz, Dina Hussein, Soochang Park, Son N. Han, Noël Crespi:

The Cluster Between Internet of Things and Social Networks: Review and Research Challenges. 206-215 - Yanqing Zhu, Bei Chen, Ming Qin, Qing-An Huang

:
2-D Micromachined Thermal Wind Sensors - A Review. 216-232 - Su Xia, Hongyi Wu, Miao Jin:

GPS-Free Greedy Routing With Delivery Guarantee and Low Stretch Factor on 2-D and 3-D Surfaces. 233-242 - Zhen Ren, Xin Qi, Gang Zhou, Haining Wang:

Exploiting the Data Sensitivity of Neurometric Fidelity for Optimizing EEG Sensing. 243-254 - Liang Yu, Tao Jiang, Yang Cao, Qi Qi:

Carbon-Aware Energy Cost Minimization for Distributed Internet Data Centers in Smart Microgrids. 255-264 - Sye Loong Keoh

, Sandeep S. Kumar, Hannes Tschofenig:
Securing the Internet of Things: A Standardization Perspective. 265-275 - Sherif Abdelwahab, Bechir Hamdaoui, Mohsen Guizani, Ammar Rayes:

Enabling Smart Cloud Services Through Remote Sensing: An Internet of Everything Enabler. 276-288
Volume 1, Number 4, August 2014
- Ning Lu, Nan Cheng, Ning Zhang

, Xuemin Shen
, Jon W. Mark:
Connected Vehicles: Solutions and Challenges. 289-299 - Muhammad S. Khan, Mohammad S. Islam, Hai Deng:

Design of a Reconfigurable RFID Sensing Tag as a Generic Sensing Platform Toward the Future Internet of Things. 300-310 - Yuan Zhang

, Limin Sun, Houbing Song
, Xiaojun Cao
:
Ubiquitous WSN for Healthcare: Recent Advances and Future Prospects. 311-318 - Kary Främling, Sylvain Kubler

, Andrea Buda:
Universal Messaging Standards for the IoT From a Lifecycle Management Perspective. 319-327 - Xiang Sheng, Jian Tang, Xuejie Xiao, Guoliang Xue:

Leveraging GPS-Less Sensing Scheduling for Green Mobile Crowd Sensing. 328-336 - Pin-Yu Chen, Shin-Ming Cheng

, Kwang-Cheng Chen
:
Information Fusion to Defend Intentional Attack in Internet of Things. 337-348 - Shanzhi Chen, Hui Xu, Dake Liu, Bo Hu, Hucheng Wang:

A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective. 349-359 - Burak Kantarci, Hussein T. Mouftah:

Trustworthy Sensing for Public Safety in Cloud-Centric Internet of Things. 360-368
Volume 1, Number 5, October 2014
- Kui Ren

, Pierangela Samarati
, Marco Gruteser, Peng Ning, Yunhao Liu:
Guest Editorial Special Issue on Security for IoT: The State of the Art. 369-371 - Kuan Zhang

, Xiaohui Liang
, Rongxing Lu, Xuemin Shen
:
Sybil Attacks and Their Defenses in the Internet of Things. 372-383 - Christine Hennebert

, Jessye Dos Santos:
Security Protocols and Privacy Issues into 6LoWPAN Stack: A Synthesis. 384-398 - Abdulmonem M. Rashwan

, Abd-Elhamid M. Taha, Hossam S. Hassanein
:
Characterizing the Performance of Security Functions in Mobile Computing Systems. 399-413 - Depeng Li, Zeyar Aung

, John R. Williams, Abel Sanchez:
P3: Privacy Preservation Protocol for Automatic Appliance Control Application in Smart Grid. 414-429 - Debasmit Banerjee, Bo Dong, Mahmoud Taghizadeh, Subir Biswas:

Privacy-Preserving Channel Access for Internet of Things. 430-445 - Qian Chen

, Sherif Abdelwahed, Abdelkarim Erradi:
A Model-Based Validated Autonomic Approach to Self-Protect Computing Systems. 446-460 - Wei Tan, Ke Xu, Dan Wang

:
An Anti-Tracking Source-Location Privacy Protection Protocol in WSNs Based on Path Extension. 461-471 - Hao Yue

, Linke Guo, Ruidong Li
, Hitoshi Asaeda
, Yuguang Fang
:
DataClouds: Enabling Community-Based Data-Centric Services Over the Internet of Things. 472-482 - Jonas Michel, Christine Julien

, Jamie Payton:
Gander: Mobile, Pervasive Search of the Here and Now in the Here and Now. 483-496 - Andrew Attwood, David J. Lamb, Omar Abuelma'atti:

Position-Relative Identities in the Internet of Things: An Evolutionary GHT Approach. 497-507 - Simone Cirani

, Luca Davoli
, Gianluigi Ferrari
, Rémy Léone, Paolo Medagliani, Marco Picone
, Luca Veltri:
A Scalable and Self-Configuring Architecture for Service Discovery in the Internet of Things. 508-521
Volume 1, Number 6, December 2014
- Hassnaa Moustafa, Giovanni Pau

, Fan Bai, Yan Zhang:
Guest Editorial. 522-524 - Zhiwei Yan, Sherali Zeadally, Yong-Jin Park

:
A Novel Vehicular Information Network Architecture Based on Named Data Networking (NDN). 525-532 - Miao Wang, Qinghua Shen, Ran Zhang, Hao Liang, Xuemin Shen

:
Vehicle-Density-Based Adaptive MAC for High Throughput in Drive-Thru Networks. 533-543 - Neeraj Kumar

, Joel J. P. C. Rodrigues
, Naveen K. Chilamkurti:
Bayesian Coalition Game as-a-Service for Content Distribution in Internet of Vehicles. 544-555 - Junhao Lin, Ka-Cheong Leung, Victor O. K. Li:

Optimal Scheduling With Vehicle-to-Grid Regulation Service. 556-569 - Hichem Sedjelmaci, Sidi Mohammed Senouci

, Mosa Ali Abu-Rgheff:
An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks. 570-577 - Rong Yu, Jiefei Ding, Weifeng Zhong

, Yi Liu, Shengli Xie:
PHEV Charging and Discharging Cooperation in V2G Networks: A Coalition Game Approach. 578-589 - Martin Florian, Sören Finster

, Ingmar Baumgart
:
Privacy-Preserving Cooperative Route Planning. 590-599

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














