21
Views
2
CrossRef citations to date
0
Altmetric
Articles

A keyless secure data aggregation mechanism

&

References

  • A. Dardanelli, F. Maggi, M. Tanelli, S. Zanero, S. M. Savaresi, R. Kochanek, and T. Holz, “A Security Layer for Smartphone-to-Vehicle Communication Over Bluetooth”, IEEE Embedded Systems Letters, vol. 5, no. 3, September 2013. doi: 10.1109/LES.2013.2264594
  • A. Kaushik, Satvika, M. Barnela, and A. Kumar, “Keyless User Defined Optimal Security Encryption”, International Journal of Computer and Electrical Engineering, Vol.4, No.2, April 2012.
  • Akio Sashima, Takeshi Ikeda and Koichi Kurumatani, “Toward Mobile Sensor Fusion Platform for Context-Aware Services”, National Institute of Advanced Industrial Science and Technology / crest, JST, Japan.
  • Andrews, Leo John Baptist, Linesh Raja, and Suresh Shanmugasundaram. “Mobile android-based remote patient monitoring system through wearable sensors.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 557-568. doi: 10.1080/09720529.2019.1637156
  • Chaudhary, Bhawna, and Karan Singh. “Pseudonym generation using genetic algorithm in vehicular ad hoc networks.” Journal of Discrete Mathematical Sciences and Cryptography 22, no. 4 (2019): 661-677. doi: 10.1080/09720529.2019.1642625
  • D. Christin, M. Hollick and Mark Manulis, “Security and Privacy Objectives for Sensing Applications in Wireless Community Networks”, Computer Communications and Networks (ICCCN), 2010 Proceedings of 19th International Conference on, IEEE, Page(s): 1 - 6, 2-5 Aug. 2010, Zurich.
  • Do van Thanh, ToreJenvik, “Strong authentication with mobile phone as security token”, Mobile Adhoc and Sensor Systems, 2009. MASS ‘09, IEEE 6th International Conference, No: 777 - 782, 12-15 Oct. 2009, Macau.
  • Kaushik, Shivkant, Ramesh C. Poonia, and Sunil Kumar Khatri. “Comparative study of various protocols of DDS.” Journal of Statistics and Management Systems 20, no. 4 (2017): 647-658. doi: 10.1080/09720510.2017.1395184
  • Khan, Tayyab, Karan Singh, Mohamed Abdel-Basset, Hoang Viet Long, Satya P. Singh, and Manisha Manjul. “A Novel and Comprehensive Trust Estimation Clustering-Based Approach for Large Scale Wireless Sensor Networks.” IEEE Access, vol. 7, pp. 58221-58240, (2019). doi: 10.1109/ACCESS.2019.2914769
  • Kumar, Ankit, and Madhavi Sinha. “Design and development of new framework for detection and mitigation of wormhole and black hole attacks in VANET.” Journal of Statistics and Management Systems 22, no. 4 (2019): 753-761. doi: 10.1080/09720510.2019.1609555
  • Kumar, Sunil, Karan Singh, Sushil Kumar, OmprakashKaiwartya, Yue Cao, and Huan Zhou. “Delimitated anti jammer scheme for Internet of vehicle: Machine learning based security approach.” IEEE Access 7 (2019): 113311-113323. doi: 10.1109/ACCESS.2019.2934632
  • Kumar, Ankit, and Madhavi Sinha. “Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET).” Journal of Discrete Mathematical Sciences and Cryptography 22, no. 4 (2019): 453-463. doi: 10.1080/09720529.2019.1637151
  • M. Azizyan, Romit Roy Choudhury, Ionut Constandache, “Surround-Sense: Mobile Phone Localization via Ambience Fingerprinting”, September 20–25, 2009, Beijing, China.
  • Ming-Ru, Zhang, Chen-Ching Yang, Shu-Yi Ho, and Chang-Hsing Chang. “A study on enterprise under globalization competition knowledge management and creation overhead construction.” Journal of Interdisciplinary Mathematics 17, no. 5-6 (2014): 423-433. doi: 10.1080/09720502.2013.800299
  • Mubarak AI-Hadadi, Ali AI Shidhani, “Smartphone Security Awareness: Time to Act”, International Conference on Current Trends in Information Technology (CTIT), IEEE, Page(s),166-171, 2013 Dubai.
  • N.D. Lane, M. Mohammod, M. Lin, X. Yang, H. Lu, S. Ali, A. Doryab, E. Berke, T. Choudhary, and A. Campbell, “Bewell: A Smartphone Application to Monitor, Model and Promote Wellbeing”, Proc. Fifth Int’l ICST Conf. Pervasive Computing Technologies for Healthcare, 2011.
  • Poonia, Ramesh C. “Integration of traffic and network simulators for vehicular ad-hoc networks.” Journal of Information and Optimization Sciences 39, no. 7 (2018): 1583-1589. doi: 10.1080/02522667.2017.1406580
  • Qinghua Li and Thomas F. La Porta, Guohong Cao, “Efficient and Privacy-Aware Data Aggregation in Mobile Sensing”, IEEE transactions on dependable and secure computing, VOL 11, NO.2, March/ April 2014.
  • Qinghua Li, Guohong Cao, “Providing Privacy-Aware Incentives for Mobile Sensing”, Department of Computer Science and Computer Engineering, University of Arkansas, Department of Computer Science and Engineering, Pennsylvania State University.
  • Robert Scoble & Shel Israel, “Age of Context: Mobile, Sensors, Data and The Future OF Privacy”, 1st Addition, DBA of on Demand Publishing LLC.
  • S. Hallsteinsen, I. Jørstad, “Using the mobile phone as a security token for unified authentication”, Second International Conference on Systems and Networks Communications, IEEE, Pages 78-98, No:68, 2007, CapEsterel.
  • Saad, George W. Helmy, and Magdy A. Ahmed. “Power saving by incorporating mobile agents and clustering approach in wireless sensor networks.” Journal of Discrete Mathematical Sciences and Cryptography 15.2-3 (2012): 135-147. doi: 10.1080/09720529.2012.10698370
  • Sohail Khan, Mohammad Nauman, Abu Talib Othman, Shahrulniza Musa , “How Secure is your Smartphone: An Analysis of Smartphone Security Mechanisms”, Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference in IEEE, No: 76–81, Kuala Lumpur.
  • Verma, Gaurav, ChetnaDabas, Ashish Goel, Manish Kumar, and Vijay Khare. “Clustering based power optimization of digital circuits for FPGAs.” Journal of Information and Optimization Sciences 38, no. 6 (2017): 1029-1037. doi: 10.1080/02522667.2017.1372154
  • W. Z. Khan, Yang Xiang, Mohammed Y Aalsalem, and Quratulain Arshad, “Mobile Phone Sensing Systems: A Survey”, IEEE Communications Surveys &TutorialS, VOL. 15, NO. 1, First Quarter 2013.
  • Wang, Xiao-Xia, Xi-Yuan Liu, and Zhan-Qiang Li. “A social collaborative urban distribution integration platform.” Journal of Interdisciplinary Mathematics 21, no. 5 (2018): 1109-1113. doi: 10.1080/09720502.2018.1493038
  • Y. Hao, E. Osterweil, D. Massey, L. Songwu, and Z. Lixia, “Deploying Cryptography in Internet-Scale Systems: A Case Study on DNS-SEC”, IEEE Transactions on Dependable and Secure Computing, vol. 8, no. 5, pp. 656-669, Sept 2011. doi: 10.1109/TDSC.2010.10
  • Yong Wang, Kevin Streff, and Sonell Raman, “Security Threats and Analysis of Security Challenges in Smartphones”, IEEE Computer Society, 2012.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.