|
[1] F. Shrouf, J. Ordieres, and G. Miragliotta, “Smart factories in Industry 4.0: A review of the concept and of energy management approached in production based on the Internet of Things paradigm,” in IEEE International Conference on Industrial Engineering and Engineering Management, 2014, pp. 697–701. [2] Y. Liu et al., “Does wireless sensor network scale? A measurement study on GreenOrbs,” 2011 Proc. IEEE INFOCOM, vol. 24, no. 10, pp. 873–881, 2011. [3] Statista, “Cell phone sales worldwide 2007-2017.” [Online]. Available: https://www.statista.com/statistics/263437/global-smartphone-sales-to-end-users-since-2007/. [Accessed: 10-Apr-2018]. [4] Statista, “Wearables sales worldwide by region 2015-2021.” [Online]. Available: https://www.statista.com/statistics/490231/wearable-devices-worldwide-by-region/. [Accessed: 04-May-2018]. [5] Statista, “Share of new cars sold that are connected to the Internet worldwide from 2015 to 2025.” [Online]. Available: https://www.statista.com/statistics/275849/number-of-vehicles-connected-to-the-internet/. [Accessed: 04-May-2018]. [6] R. K. Ganti, F. Ye, and H. Lei, “Mobile crowdsensing: Current state and future challenges,” IEEE Commun. Mag., vol. 49, no. 11, pp. 32–39, 2011. [7] B. Guo, Z. Yu, X. Zhou, and D. Zhang, “From participatory sensing to Mobile Crowd Sensing,” 2014 IEEE Int. Conf. Pervasive Comput. Commun. Work. PERCOM Work. 2014, pp. 593–598, 2014. [8] H. Ma, D. Zhao, and P. Yuan, “Opportunities in mobile crowd sensing,” Infocommunications J., vol. 7, no. 2, pp. 32–38, 2015. [9] X. Zhang et al., “Incentives for mobile crowd sensing: A survey,” IEEE Commun. Surv. Tutorials, vol. 18, no. 1, pp. 54–67, 2016. [10] P. Bellavista, A. Corradi, L. Foschini, and R. Ianniello, “Scalable and cost-effective assignment of mobile crowdsensing tasks based on profiling trends and prediction: The ParticipAct living lab experience,” Sensors (Switzerland), vol. 15, no. 8, pp. 18613–18640, 2015. [11] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” www.bitcoin.org, p. 9, 2008. [12] G. Wood, “Ethereum: a secure decentralised generalised transaction ledger,” Ethereum Proj. Yellow Pap., pp. 1–32, 2014. [13] J. Burke et al., “Participatory Sensing,” World Sens. Web Work. ACM Sensys, 2006. [14] N. D. Lane, E. Miluzzo, H. Lu, D. Peebles, T. Choudhury, and A. T. Campbell, “A survey of mobile phone sensing,” IEEE Commun. Mag., vol. 48, no. 9, pp. 140–150, 2010. [15] W. Z. Khan, Y. Xiang, M. Y. Aalsalem, and Q. Arshad, “Mobile Phone Sensing Systems: A Survey,” IEEE Commun. Surv. Tutorials, vol. 15, no. 1, pp. 402–427, 2013. [16] D. Zhang, L. Wang, H. Xiong, and B. Guo, “4W1H in mobile crowd sensing,” IEEE Commun. Mag., vol. 52, no. 8, pp. 42–48, 2014. [17] M.-R. Ra, B. Liu, T. F. La Porta, and R. Govindan, “Medusa: a programming framework for crowd-sensing applications,” Proc. 10th Int. Conf. Mob. Syst. Appl. Serv. - MobiSys ’12, p. 337, 2012. [18] I. Carreras, D. Miorandi, A. Tamilin, E. R. Ssebaggala, and N. Conci, “Matador: Mobile task detector for context-aware crowd-sensing campaigns,” in 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, PerCom Workshops 2013, 2013, pp. 212–217. [19] X. Hu, T. H. S. Chu, H. C. B. Chan, and V. C. M. Leung, “Vita: A crowdsensing-oriented mobile cyber-physical system,” IEEE Trans. Emerg. Top. Comput., vol. 1, no. 1, pp. 148–165, 2013. [20] G. Cardone, A. Corradi, L. Foschini, and R. Ianniello, “ParticipAct: A Large-Scale Crowdsensing Platform,” IEEE Trans. Emerg. Top. Comput., vol. 4, no. 1, pp. 21–32, 2016. [21] M. Li, J. Weng, A. Yang, and W. Lu, “CrowdBC: A Blockchain-based Decentralized Framework for Crowdsourcing,” IACR Cryptol. ePrint Arch., pp. 1–12, 2017. [22] J. Wang, M. Li, Y. He, H. Li, K. Xiao, and C. Wang, “A Blockchain Based Privacy-Preserving Incentive Mechanism in Crowdsensing Applications,” IEEE Access, vol. 6, pp. 17545–17556, 2018. [23] A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies Introduction to the book. 2016. [24] C. Percival, “The scrypt key derivation function and encryption utility.” [Online]. Available: http://www.tarsnap.com/scrypt.html. [Accessed: 14-May-2018]. [25] J. R. Douceur, “The Sybil Attack,” in Revised Papers from the First International Workshop on Peer-to-Peer Systems, 2002, pp. 251–260. [26] M. Castro, M. Castro, B. Liskov, and B. Liskov, “Practical Byzantine fault tolerance,” in OSDI {’}99: Proceedings of the third symposium on Operating systems design and implementation, 1999, pp. 173–186. [27] “Hyperledger Fabric v0.6 Consensus - Archive.” [Online]. Available: https://github.com/hyperledger-archives/fabric/wiki/Consensus. [Accessed: 15-May-2018]. [28] “Introduction to Hyperledger Sawtooth.” [Online]. Available: https://sawtooth.hyperledger.org/docs/core/nightly/0-8/introduction.html#proof-of-elapsed-time-poet. [Accessed: 14-May-2018]. [29] “Clique PoA protocol & Rinkeby PoA testnet.” [Online]. Available: https://github.com/ethereum/EIPs/issues/225. [Accessed: 14-May-2018]. [30] “Proof-of-Authority Chains.” [Online]. Available: https://wiki.parity.io/Proof-of-Authority-Chains. [Accessed: 14-May-2018]. [31] “Raft-based consensus for Ethereum/Quorum.” [Online]. Available: https://github.com/jpmorganchase/quorum/blob/master/raft/doc.md. [Accessed: 14-May-2018]. [32] “Smart Contracts: Building Blocks for Digital Markets.” [Online]. Available: http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html. [Accessed: 16-May-2018]. [33] P. McCorry, S. Shahandashti, D. Clarke, and F. Hao, “Authenticated Key Exchange over Bitcoin,” in International Conference on Research in Security Standardisation, 2015, pp. 3–20. [34] D. Johnson, A. Menezes, and S. Vanstone, “The Elliptic Curve Digital Signature Algorithm (ECDSA),” Int. J. Inf. Secur., vol. 1, no. 1, pp. 36–63, 2001. [35] D. Hankerson, S. Vanstone, and A. Menezes, Guide to elliptic curve cryptography. Springer-Verlag, 2004. [36] “TESTNET Rinkeby (ETH) Blockchain Explorer.” [Online]. Available: https://rinkeby.etherscan.io/. [Accessed: 10-Jul-2018]. [37] M. Palatinus, P. Rusnak, A. Voisine, and S. Bowe, “Mnemonic code for generating deterministic keys,” 2013. [Online]. Available: https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki. [Accessed: 15-Jun-2018]. [38] A. Joux and K. Nguyen, “Separating decision diffie-hellman from computational diffie-hellman in cryptographic groups,” J. Cryptol., vol. 16, no. 4, pp. 239–247, 2003.
|