Trust-aware secure routing protocol for wireless sensor networks |
Hu, Huangshui
(College of Computer Science and Engineering, Changchun University of Technology)
Han, Youjia (College of Computer Science and Engineering, Changchun University of Technology) Wang, Hongzhi (College of Computer Science and Engineering, Jilin University of Architecture and Technology) Yao, Meiqin (College of Computer Science and Engineering, Changchun University of Technology) Wang, Chuhang (College of Computer Science and Technology, Changchun Normal University) |
1 | E. Perkins and E. M. Royer, Ad-hoc on-demand distance vector routing, in Proc. IEEE Workshop Mobile Comput. Syst. Appl. (New Orleans, LA, USA), Feb. 1999, pp. 90-100, doi: https://doi.org/10.1109/MCSA.1999.749281. DOI |
2 | W. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in Proc. Annu. Hawaii Int. Conf. Syst. Sci. (Maui, HI, USA), Jan. 2000, pp. 3005-3014. |
3 | O. Alfarraj, A. A. Alzubi, and A. Tolba, Trust-based neighbor selection using activation function for secure routing in wireless sensor networks, J. Ambient Intell. Humanized Comput. (2018), 1-11, doi: https://doi.org/10.1007/s12652-018-0885-1. DOI |
4 | H. Bashirpour et al., An improved digital signature protocol to multi-user broadcast authentication based on elliptic curve cryptography in wireless sensor networks (WSNs), Math. Comput. Appl. 23 (2018), 1-15. |
5 | U. S. Kumaran and P. Ilango, Secure authentication and integrity techniques for randomized secured routing in WSN, Wirel. Netw. 21 (2015), 443-451. DOI |
6 | M. Elhoseny et al., A secure data routing schema for WSN using elliptic curve cryptography and homomorphic encryption, J. King Saud Univ.-Comput. Inf. Sci. Archive 28 (2016), 262-275. |
7 | M. Elhoseny et al., An energy efficient encryption method for secure dynamic WSN, Secur. Commun. Netw. 9 (2016), 2024-2031. DOI |
8 | B. Jiang et al., Trust based energy efficient data collection with unmanned aerial vehicle in edge network, Trans. Emerging Telecommun. Technol. (2020), e3942, doi: https://doi.org/10.1002/ett.3942. DOI |
9 | B. Priayoheswari et al., Beta reputation and direct trust model for secure communication in wireless sensor networks, in Proc. Int. Conf. Inf. Analytics (Pondicherry, India), Aug. 2016, 73:1-11, doi: https://doi.org/10.1145/2980258.2980413 DOI |
10 | D. Airehrour, J. Gutierrez, and S. K. Ray, Gradetrust: A secure trust based routing protocol for MANETs, in Proc. Int. Telecommun. Netw. Appl. Conf. (Sydney, Australia), Nov. 2015. pp. 65-70. |
11 | T. Wang et al., A trusted and energy efficient approach for cluster-based wireless sensor networks, Int. J. Distrib. Sensor Netw. 12 (2016), 1-13. |
12 | S. Raza et al., Trust based energy preserving routing protocol in multi-hop WSN, in Networked Systems, vol. 9466, Springer, Cham, Switzerland, 2015, pp. 518-523, doi: https://doi.org/10.1007/978-3-319-26850-7_42 DOI |
13 | H. Lazrag, R. Saadane, D. Aboutajdine, A game theoretic approach for optimal and secure routing in WSN, in Proc. Int. AfroEur. Conf. Industrial Adv. (Marrakesh, Morocco), Nov. 2016, pp. 218-228. |
14 | A. Ahmed et al., Countering node misbehavior attacks using trust based secure routing protocol, TELKOMNIKA Telecommun. Comput. Electron. Contr. 13 (2015), 260-268. |
15 | Y. Ren et al., A trust-based minimum cost and quality aware data collection scheme in P2P network, Peer-to-Peer Netw. Appl. 13 (2020), 2300-2323, doi: https://doi.org/10.1007/s12083-020-00898-2 DOI |
16 | Y. Liu et al., ActiveTrust: Secure and trustable routing in wireless sensor networks, IEEE Trans. Inf. Forensics Secur. 11 (2016), 2013-2027. DOI |
17 | Y. M. Zhou and L. Y. Li, A trust-aware and location-based secure routing protocol for WSN, Appl. Mechan. Mater. 373-375 (2013), 1931-1934. DOI |
18 | M. Al-Shalabi et al., Energy efficient multi-hop path in wireless sensor networks using an enhanced genetic algorithm, Inf. Sci. 500 (2019), 259-273. DOI |
19 | M. Elhoseny et al., Optimizing K-coverage of mobile WSNs, Expert Syst. Appl. 92 (2018), 142-153. DOI |
20 | Z. Sun et al., Secure routing protocol based on multi-objective ant-colony-optimization for wireless sensor networks, Appl. Soft Comput. 77 (2019), 366-375. DOI |
21 | M. Selvi et al., An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks, Wirel. Pers. Commun. 105 (2019), 1475-1490. DOI |
22 | T. Li et al., Trust data collections via vehicles joint with unmanned aerial vehicles in the smart Internet of Things, Trans Emerging Telecommun. Technol. (2020), e3956, https://doi.org/10.1002/ett.3956. DOI |
23 | Ahmed et al., Energy-aware and secure routing with trust for disaster response wireless sensor network, Peer-to-peer Netw. Applicat. 10 (2017), 216-237. DOI |
24 | G. Zhang et al., Using trust to establish a secure routing model in cognitive radio network, PLoS One 10 (2015), no. 9, e0139326, doi: https://doi.org/10.1371/journal.pone.0139326 DOI |
25 | P. Gong, T. M. Chen, and Q. Xu, ETARP: An energy efficient trust-aware routing protocol for wireless sensor networks, J. Sensors 2015 (2015), 1-10. |
26 | G. Dhand and S. S. Tyagi, SMEER: Secure multi-tier energy efficient routing protocol for hierarchical wireless sensor networks, Wirel. Pers. Commun. 105 (2019), 17-35. DOI |
27 | L. Yao, F. X. Gao, and L. Cong, Research on static game theory based secure routing algorithm in WSN, Appl. Mechan. Mater. 571-572 (2014), 1030-1036. DOI |
28 | D. Qin et al., Research on trust sensing based secure routing mechanism for wireless sensor network, Int. Conf. Commun. 5 (2017), 9599-9609. |
![]() |