共 58 条
[1]
Atzori L(2010)The internet of things: A survey Computer Networks 54 2787-2805
[2]
Iera A(2006)Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks IEEE Communications Magazine 44 134-141
[3]
Morabito G(2013)Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things Journal of Network and Computer Applications 36 1531-1539
[4]
Pelusi L(2015)Security, privacy and trust in internet of things: The road ahead Computer Networks 76 146-164
[5]
Passarella A(2018)Energy and interoperable aware routing for throughput optimization in clustered IoT-wireless sensor networks Future Generation Computer Systems 81 372-381
[6]
Conti M(2015)Security and trust management in opportunistic networks: A survey Security and Communication Networks 8 1812-1827
[7]
Guo B(2018)An efficient RSA-based certificateless public key encryption scheme Discrete Applied Mathematics 241 39-47
[8]
Zhang D(2018)A location prediction-based routing scheme for opportunistic networks in an IoT scenario Journal of Parallel and Distributed Computing 118 369-378
[9]
Wang Z(2016)Detecting colluding blackhole and greyhole attacks in delay tolerant networks IEEE Transactions on Mobile Computing 15 1116-1129
[10]
Yu Z(2018)A privacy-preserving message forwarding framework for opportunistic cloud of things IEEE Internet of Things Journal 5 5281-5295