An Energy Efficient Cluster Head Selection Technique Using Network Trust and Swarm Intelligence
暂无分享,去创建一个
[1] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[2] Rodrigo Roman,et al. Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..
[3] Yuguang Fang,et al. A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[4] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[5] Shailender Gupta,et al. IMPACT OF SELFISH NODE CONCENTRATION IN MANET S , 2011 .
[6] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[7] Dong Yang,et al. TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[8] Zhiping Liu,et al. Performance Comparison of Single and Multi-Path Routing Protocol in MANET with Selfish Behaviors , 2010 .
[9] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[10] Nicholas R. Jennings,et al. A Probabilistic Trust Model for Handling Inaccurate Reputation Sources , 2005, iTrust.
[11] Dervis Karaboga,et al. Parameter Tuning for the Artificial Bee Colony Algorithm , 2009, ICCCI.
[12] Thomas Kunz,et al. New findings on the complexity of cluster head selection algorithms , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[13] Networks Shio,et al. A Survey of Energy-Efficient Hierarchical Cluster-Based Routing in Wireless Sensor , 2010 .
[14] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[15] Wei Wang,et al. A Trust Establishment Scheme for Cluster-Based Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[16] Ahmed Ayadi,et al. Energy-Efficient and Reliable Transport Protocols for Wireless Sensor Networks: State-of-Art , 2011, Wirel. Sens. Netw..
[17] Sajid Hussain,et al. Hierarchical Cluster-based Routing in Wireless Sensor Networks , 2006 .
[18] M. R. Tripathy,et al. Routing Protocols in Wireless Sensor Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[19] Gongxuan Zhang,et al. Hierarchical Clustering Routing Protocol Based on Optimal Load Balancing in Wireless Sensor Networks , 2013, APPT.
[20] S. Challa,et al. Trust Management in Wireless Sensor Networks , 2007 .
[21] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[22] Shio Kumar Singh,et al. A Survey of Energy-Efficient Hierarchical Cluster-Based Routing in Wireless Sensor , 2010 .
[23] Niki Pissinou,et al. Cluster-Based Reputation and Trust for Wireless Sensor Networks , 2007, 2007 4th IEEE Consumer Communications and Networking Conference.
[24] Xiangliang Zhang,et al. CAF: Cluster Algorithm and A-Star with Fuzzy Approach for Lifetime Enhancement in Wireless Sensor Networks , 2014 .
[25] Kalpana Sharma,et al. Wireless Sensor Networks: An Overview on its Security Threats , 2010 .
[26] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[27] Zhiping Jia,et al. Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..
[28] Rajib Mall,et al. Quality of Service (QoS) Provisions in Wireless Sensor Networks and Related Challenges , 2010, Wirel. Sens. Netw..
[29] V. Palanisamy,et al. AN EFFICIENT CLUSTER BASED APPROACH FOR MULTI -SOURCE MULTICAST ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS , 2011 .
[30] Yunlong Zhu,et al. A Clustering Approach Using Cooperative Artificial Bee Colony Algorithm , 2010 .
[31] Vallipuram Muthukkumarasamy,et al. Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[32] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[33] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[34] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[35] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[36] Francisco Rodríguez,et al. Simulation of Greenhouse Climate Monitoring and Control with Wireless Sensor Network and Event-Based Control , 2009, Sensors.
[37] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[38] Vahid Majid Nezhad,et al. Novel Cluster Based Routing Protocol in Wireless Sensor Networks , 2010 .
[39] Safiqul Islam,et al. Anomaly Intrusion Detection System in Wireless Sensor Networks: Security Threats and Existing Approaches , 2011 .
[40] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[41] Antonio Capone,et al. EFW: A cross-layer metric for reliable routing in wireless mesh networks with selfish participants , 2011, 2011 Proceedings IEEE INFOCOM.
[42] Smriti Kumar Sinha,et al. A New Trust Model Based on Social Characteristics and Reputation Mechanisms Using Best Local Prediction Selection Approach , 2009, 2009 International Conference on New Trends in Information and Service Science.