References
- Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cayirci, E., "Wireless sensor networks: A survey," Comput. Netw, Vol.38, pp.393-422, 2002. https://doi.org/10.1016/S1389-1286(01)00302-4
- Yick, J., Mukherjee, B., Ghosal, D., "Wireless sensor network survey," Comput. Netw., vol.52, pp. 2292-2330, 2008. https://doi.org/10.1016/j.comnet.2008.04.002
- H. Chan, A. Perrig, "Security and privacy in sensor networks," IEEE Computer, vol.36, no.10, pp.103-105, 2003.
- Y.M. Huang, M.Y. Hsieh, H.C. Chao, S.H. Hung, J.H. Park, Pervasive, "Secure access to a hierarchical-based healthcare monitoring architecture in wireless heterogeneous sensor networks," IEEE Journal on Selected Areas of Communications, vol. 27, no.4, pp.400-411, 2009. https://doi.org/10.1109/JSAC.2009.090505
- S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," ACM Trans. Sensor Netw., vol. 4, no. 3, pp. 1-37, May 2008.
- G. Zhan, W. Shi, and J. Deng, "Design and implementation of TARF: A trust-aware routing framework for WSNs," IEEE Trans. Depend. Secure Comput., vol. 9, no. 2, pp. 184-197, Apr. 2012. https://doi.org/10.1109/TDSC.2011.58
- E. Aivaloglou and S. Gritzalis, "Hybrid trust and reputation management for sensor networks," Wireless Netw., vol. 16, no. 5, pp.1493-1510, Jul. 2010. https://doi.org/10.1007/s11276-009-0216-8
-
A.Rezgui andM. Eltoweissy, "
${\mu}RACE$ : A reliable adaptive service driven efficient routing protocol suite for sensor-actuator networks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 5, pp. 607-622, May 2009. https://doi.org/10.1109/TPDS.2008.94 - S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proc. of ACM Workshop Security of ad hoc and Sensor Networks (SASN'04), pp. 66-67, Oct. 2004.
- Z. Yao, D. Kim, and Y. Doh, "PLUS: Parameterized and localized trust management scheme for sensor networks security," in Proc. of Third IEEE Int. Conf. Mobile Ad-Hoc and Sensor Systems (MASS'06), pp. 437-446, Oct. 2006.
- R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, and S. Lee, "Group-based trust management scheme for clustered wireless sensor networks," IEEE Trans. Parallel Distrib. Syst., vol. 20, no. 11, pp.1698-1712, Nov. 2009. https://doi.org/10.1109/TPDS.2008.258
- F. Bao, I. Chen,M.Chang, and J. Cho, "Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection," IEEE Trans. Netw. Service Manag., vol. 9, no. 2, pp. 169-183, Jun. 2012. https://doi.org/10.1109/TCOMM.2012.031912.110179
- G. V. Crosby, N. Pissinou, and J. Gadze, "A framework for trust-based cluster head election in wireless sensor networks," in Proc. of Second IEEEWorkshop on Dependability and Security in Sensor Networks and Systems, pp. 10-22, 2006.
- R. A. Raje and A. V. Sakhare, "Routing in wireless sensor network using fuzzy based trust model," in Proc. of the 4th International Conference on Communication Systems and Network Technologies (CSNT '14), pp. 7-9, 2014.
- W. R. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, "Energy-efficient communication protocol for wireless microsensor networks," in Proc. of the 33rd International Conference on System Sciences, pp. 1-10, Maui, Hawaii, USA, 2000.
- W. Wang, F. Du, and Q. Xu, "An improvement of LEACH routing protocol based on trust for wireless sensor networks," in Proc. of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '09), pp. 1-4, Beijing, China, September 2009.
- Yuxin Liu, Mianxiong Dong, Kaoru Ota, Anfeng Liu, "ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks," IEEE Transactions on Information Forensics and Security, Vol. 11, No. 9, pp. 2013-2027, 2016. https://doi.org/10.1109/TIFS.2016.2570740
- Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb, Abdul Waheed Khan, "TERP: A Trust and Energy Aware Routing Protocol for Wireless Sensor Network," IEEE Sensors Journal, Vol. 15, No. 12, pp.6962-6972, 2015. https://doi.org/10.1109/JSEN.2015.2468576
- Junqi Duan, Deyun Gao, Dong Yang, Chuan Heng Foh, Hsiao-Hwa Chen, "An Energy-Aware Trust Derivation Scheme With Game Theoretic Approach in Wireless Sensor Networks for IoT Applications," IEEE Internet of Things Journal, Vol.1, No.1, pp. 58-69, 2014. https://doi.org/10.1109/JIOT.2014.2314132
- Shuaishuai Tan, Xiaoping Li, Qingkuan Dong, "A Trust Management System for Securing Data Plane of Ad-Hoc Networks," IEEE Transactions on Vehicular Technology, Vol.35, No.9, pp. 7579-7592, 2015.
- Mohamed M.E.A. Mahmoud, Xiaodong Lin, Xuemin (Sherman) Shen, "Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks," IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.4, pp.1140-1153, 2013. https://doi.org/10.1109/TPDS.2013.138
- Jinfang Jiang, Guangjie Han, Feng Wang, Lei Shu, Mohsen Guizani, "An Efficient Distributed Trust Model for Wireless Sensor Networks," IEEE Transactions on Parallel and Distributed Systems, Vol.26, No.5, pp. 1228-1237, 2015. https://doi.org/10.1109/TPDS.2014.2320505
- Dempster, A. P., "Upper and lower probabilities induced by a multivalued mapping," The Annals of Mathematical Statistics, vol.38, No.2, pp.325-339, 1967. https://doi.org/10.1214/aoms/1177698950
- Thomas M. Chen and Varadharajan Venkataramanan, "Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks," IEEE Internet Computing, Vol.9, pp.35-41, 2005.
- Zuo Chen, Min He, Wei Liang, and Kai Chen, "Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network," Journal of Sensors, vol.2015, pp. 1-10, 2015.
Cited by
- A new clustering algorithm based on the connected region generation vol.12, pp.6, 2018, https://doi.org/10.3837/tiis.2018.06.010