Energy-efficient routing and secure communication in wireless sensor networks

xviii List of Publications xx

[1]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[2]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[3]  Wendi Heinzelman,et al.  Proceedings of the 33rd Hawaii International Conference on System Sciences- 2000 Energy-Efficient Communication Protocol for Wireless Microsensor Networks , 2022 .

[4]  Christos Douligeris,et al.  Energy Efficient Routing in Wireless Sensor Networks Through Balanced Clustering , 2013, Algorithms.

[5]  Daniel F. Macedo,et al.  Spatial query processing in wireless sensor networks - A survey , 2014, Inf. Fusion.

[6]  Uwe Schwiegelshohn,et al.  Analysis of first-come-first-serve parallel job scheduling , 1998, SODA '98.

[7]  Xenofon D. Koutsoukos,et al.  A Survey on Localization for Mobile Wireless Sensor Networks , 2009, MELT.

[8]  Stefanie Gerdes,et al.  A CoAP-gateway for smart homes , 2012, 2012 International Conference on Computing, Networking and Communications (ICNC).

[9]  Aries Kusdaryono,et al.  A Clustering Protocol with Mode Selection for Wireless Sensor Network , 2011, J. Inf. Process. Syst..

[10]  Jiankun Hu,et al.  Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks , 2010, 2010 Ninth IEEE International Symposium on Network Computing and Applications.

[11]  Vidyasagar Potdar,et al.  Wireless Sensor Network transport protocol: A critical review , 2013, J. Netw. Comput. Appl..

[12]  Zach Shelby,et al.  Constrained RESTful Environments (CoRE) Link Format , 2012, RFC.

[13]  Özgür Ulusoy,et al.  A framework for use of wireless sensor networks in forest fire detection and monitoring , 2012, Comput. Environ. Urban Syst..

[14]  Javier Bajo,et al.  Using Heterogeneous Wireless Sensor Networks in a Telemonitoring System for Healthcare , 2010, IEEE Transactions on Information Technology in Biomedicine.

[15]  K. Kuladinithi,et al.  Implementation of CoAP and its Application in Transport Logistics , 2011 .

[16]  Majid Sarrafzadeh,et al.  Optimal Energy Aware Clustering in Sensor Networks , 2002 .

[17]  Radim Bartos,et al.  A survey of protocols for Intermittently Connected Delay-Tolerant Wireless Sensor Networks , 2013, J. Netw. Comput. Appl..

[18]  Biplab Sikdar,et al.  Optimal Cluster Head Selection in the LEACH Architecture , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.

[19]  A. Perrig,et al.  The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.

[20]  Stephen E. Deering,et al.  Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.

[21]  Hwang Soo Lee,et al.  Gradual cluster head election for high network connectivity in large-scale sensor networks , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).

[22]  Gm. Shafiullah,et al.  A Survey of Energy-Efficient and QoS-Aware Routing Protocols for Wireless Sensor Networks , 2008 .

[23]  Lovepreet Kaur,et al.  Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey , 2014 .

[24]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[25]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[26]  Leonardo Lizzi,et al.  Object tracking through RSSI measurements in wireless sensor networks , 2008 .

[27]  Shensheng Tang,et al.  QoS supporting and optimal energy allocation for a cluster based wireless sensor network , 2006, Comput. Commun..

[28]  Carsten Bormann,et al.  The Constrained Application Protocol (CoAP) , 2014, RFC.

[29]  Chatschik Bisdikian,et al.  On Sensor Sampling and Quality of Information: A Starting Point , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[30]  Vijay Ramaraju,et al.  Energy Efficient Image Transmission In Wireless Multimedia Sensor Networks , 2014 .

[31]  Vidyasagar Potdar,et al.  ERCTP: End-to-End Reliable and Congestion Aware Transport Layer Protocol for Heterogeneous WSN , 2010, Scalable Comput. Pract. Exp..

[32]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[33]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[34]  Azer Bestavros,et al.  SEP: A Stable Election Protocol for clustered heterogeneous wireless sensor networks , 2004 .

[35]  Waylon Brunette,et al.  Data MULEs: modeling and analysis of a three-tier architecture for sparse sensor networks , 2003, Ad Hoc Networks.

[36]  S. March Security Models for Wireless Sensor Networks , 2006 .

[37]  Anantha P. Chandrakasan,et al.  An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..

[38]  Xin-Ping Guan,et al.  A distributed energy-efficient clustering algorithm with improved coverage in wireless sensor networks , 2012, Future Gener. Comput. Syst..

[39]  Maryline Laurent-Maknavicius,et al.  Security and Privacy in Emerging Wireless Networks , 2017, Secur. Commun. Networks.

[40]  Azzedine Boukerche,et al.  Underwater Wireless Sensor Networks , 2018, ACM Comput. Surv..

[41]  Rekha Jain,et al.  Wireless Sensor Network -A Survey , 2013 .

[42]  Tassos Dimitriou,et al.  Launching a Sinkhole Attack in Wireless Sensor Networks; The Intruder Side , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[43]  Anna Calveras Augé,et al.  TinyCoAP: A Novel Constrained Application Protocol (CoAP) Implementation for Embedding RESTful Web Services in Wireless Sensor Networks Based on TinyOS , 2013, J. Sens. Actuator Networks.

[44]  Young-Guk Ha,et al.  Energy-Efficient Fire Monitoring over Cluster-Based Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.

[45]  Fan Xiangning,et al.  Improvement on LEACH Protocol of Wireless Sensor Network , 2007, 2007 International Conference on Sensor Technologies and Applications (SENSORCOMM 2007).

[46]  Xiangjian He,et al.  PASCCC: Priority-based application-specific congestion control clustering protocol , 2014, Comput. Networks.

[47]  Peter Saint-Andre Extensible Messaging and Presence Protocol (XMPP): Core , 2011, RFC.

[48]  Bülent Tavli,et al.  The impact of base station mobility patterns on Wireless Sensor Network lifetime , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[49]  Choong Seon Hong,et al.  Security in wireless sensor networks: issues and challenges , 2006, 2006 8th International Conference Advanced Communication Technology.

[50]  Özgür B. Akan,et al.  Event-to-sink reliable transport in wireless sensor networks , 2005, IEEE/ACM Transactions on Networking.

[51]  Noor Zaman,et al.  Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management , 2012 .

[52]  Heonshik Shin,et al.  Reliable Wildfire Monitoring with Sparsely Deployed Wireless Sensor Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[53]  Klaus Hartke,et al.  Practical Issues with Datagram Transport Layer Security in Constrained Environments , 2014 .

[54]  Kuldip Singh,et al.  A secure dynamic identity based authentication protocol for multi-server architecture , 2011, J. Netw. Comput. Appl..

[55]  Fuxiang Gao,et al.  Detecting Wormhole Attacks in Wireless Sensor Networks with Statistical Analysis , 2010, 2010 WASE International Conference on Information Engineering.

[56]  Artemis Moroni,et al.  Vision and Challenges for Realising the Internet of Things , 2010 .

[57]  Kevin Ashton,et al.  That ‘Internet of Things’ Thing , 1999 .

[58]  Eric Rescorla,et al.  Datagram Transport Layer Security (DTLS) Extension to Establish Keys for the Secure Real-time Transport Protocol (SRTP) , 2010, RFC.

[59]  Klaus Wehrle,et al.  Security Challenges in the IP-based Internet of Things , 2011, Wirel. Pers. Commun..

[60]  Abraham O. Fapojuwo,et al.  A centralized energy-efficient routing protocol for wireless sensor networks , 2005, IEEE Communications Magazine.

[61]  Matthias Kovatsch Firm firmware and apps for the internet of things , 2011, SESENA '11.

[62]  Jian Ma,et al.  Mobile Wireless Sensor Network: Architecture and Enabling Technologies for Ubiquitous Computing , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[63]  Ian F. Akyildiz,et al.  Effects of Different Mobility Models on Traffic Patterns in Wireless Sensor Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[64]  Zhang Jun-gu,et al.  Forest fire detection system based on ZigBee wireless sensor network. , 2007 .

[65]  Hisao Ishibuchi,et al.  Performance evaluation of genetic algorithms for flowshop scheduling problems , 1994, Proceedings of the First IEEE Conference on Evolutionary Computation. IEEE World Congress on Computational Intelligence.

[66]  Purushottam Kulkarni,et al.  Energy Harvesting Sensor Nodes: Survey and Implications , 2011, IEEE Communications Surveys & Tutorials.

[67]  Geoff Mulligan,et al.  The 6LoWPAN architecture , 2007, EmNets '07.

[68]  Özgür B. Akan,et al.  ESRT: event-to-sink reliable transport in wireless sensor networks , 2003, MobiHoc '03.

[69]  Jing Zhao,et al.  A Survey of Congestion Control Mechanisms in Wireless Sensor Networks , 2010, 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[70]  Ludwig Seitz,et al.  Design Considerations for Security Protocols in Constrained Environments , 2014 .

[71]  Velmani Ramasamy Mobile Wireless Sensor Networks: An Overview , 2017 .

[72]  Ping Luo,et al.  A distributed expansible authentication model based on Kerberos , 2008, J. Netw. Comput. Appl..

[73]  U.S. Tiwary,et al.  Base station initiated dynamic routing protocol for Heterogeneous Wireless Sensor Network using clustering , 2008, 2008 Fourth International Conference on Wireless Communication and Sensor Networks.

[74]  Biswanath Mukherjee,et al.  Efficient Aggregation of Multiple Classes of Information in Wireless Sensor Networks , 2009, Sensors.

[75]  Jun Luo,et al.  Joint Sink Mobility and Routing to Maximize the Lifetime of Wireless Sensor Networks: The Case of Constrained Mobility , 2010, IEEE/ACM Transactions on Networking.

[76]  Ruzena Bajcsy,et al.  Congestion control and fairness for many-to-one routing in sensor networks , 2004, SenSys '04.

[77]  Wendi B. Heinzelman,et al.  Application-specific protocol architectures for wireless networks , 2000 .

[78]  Li-Chen Fu,et al.  Robust Location-Aware Activity Recognition Using Wireless Sensor Network in an Attentive Home , 2009, IEEE Transactions on Automation Science and Engineering.

[79]  Sanjay Ranka,et al.  Fault tolerant aggregation in heterogeneous sensor networks , 2009, J. Parallel Distributed Comput..

[80]  Varuni A. Deshpande,et al.  Automated Irrigation System Using a Wireless Sensor Network and GPRS Module , 2015 .

[81]  Wei-Kuan Shih,et al.  An efficient anonymous authentication protocol for mobile pay-TV , 2011, J. Netw. Comput. Appl..

[82]  Jack L. Burbank,et al.  An Introduction to Network Modeling and Simulation for the Practicing Engineer (The ComSoc Guides to Communications Technologies) , 2011 .

[83]  Yueming Hu,et al.  Issues of transport control protocols for wireless sensor networks , 2005, Proceedings. 2005 International Conference on Communications, Circuits and Systems, 2005..

[84]  Andrew L. Sullivan,et al.  Grassfires: Fuel, Weather and Fire Behaviour , 2009 .

[85]  Yunhao Liu,et al.  Underground Structure Monitoring with Wireless Sensor Networks , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[86]  A. Manjeshwar,et al.  TEEN: a routing protocol for enhanced efficiency in wireless sensor networks , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.

[87]  Gerd Kortuem,et al.  Smart objects as building blocks for the Internet of things , 2010, IEEE Internet Computing.

[88]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[89]  Vlad Trifa,et al.  Towards the Web of Things: Web Mashups for Embedded Devices , 2009 .

[90]  Laurence T. Yang,et al.  The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems , 2008 .

[91]  Qilian Liang,et al.  An energy-efficient protocol for wireless sensor networks , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[92]  Renjie Huang,et al.  Fusion-based volcanic earthquake detection and timing in wireless sensor networks , 2013, TOSN.

[93]  S. Singh,et al.  Routing Protocols in Wireless Sensor Networks - A Survey , 2010 .

[94]  Yong Wang,et al.  Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.

[95]  V. Jawahar Senthilkumar,et al.  Priority based Congestion Detection and avoidance in Wireless Sensor Networks , 2013, J. Comput. Sci..

[96]  Wendi B. Heinzelman,et al.  Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.

[97]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[98]  David E. Culler,et al.  Transmission of IPv6 Packets over IEEE 802.15.4 Networks , 2007, RFC.

[99]  Xiangjian He,et al.  Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.

[100]  Ren Ping Liu,et al.  Power save with Offset Listen Interval for IEEE 802.11ah Smart Grid communications , 2013, 2013 IEEE International Conference on Communications (ICC).

[101]  Bo Yu,et al.  Detecting selective forwarding attacks in wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[102]  Gang Zhou,et al.  Achieving Real-Time Target Tracking UsingWireless Sensor Networks , 2006, 12th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS'06).

[103]  Xiangjian He,et al.  A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[104]  Mario Di Francesco,et al.  Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.

[105]  Makoto Takizawa,et al.  A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.

[106]  Roy T. Fielding,et al.  Principled design of the modern Web architecture , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.

[107]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[108]  Jun Zheng,et al.  Wireless Sensor Networks: A Networking Perspective , 2009 .

[109]  Arnold K. Bregt,et al.  A mobility constraint model to infer sensor behaviour in forest fire risk monitoring , 2012, Comput. Environ. Urban Syst..

[110]  Chieh-Yih Wan,et al.  CODA: congestion detection and avoidance in sensor networks , 2003, SenSys '03.

[111]  T. O'Donnell,et al.  Energy scavenging for long-term deployable wireless sensor networks. , 2008, Talanta.

[112]  Kavi Kumar Khedo,et al.  A Wireless Sensor Network Air Pollution Monitoring System , 2010, ArXiv.

[113]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[114]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[115]  Rajashekhar C. Biradar,et al.  A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[116]  C. Bormann,et al.  Simple Keys for Simple Smart Objects , 2012 .

[117]  Xuxun Liu,et al.  A Survey on Clustering Routing Protocols in Wireless Sensor Networks , 2012, Sensors.

[118]  Xiangjian He,et al.  Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN , 2013, WWIC.

[119]  Jari Arkko,et al.  CoAP Security Architecture , 2011 .

[120]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[121]  Antonio F. Gómez-Skarmeta,et al.  Enabling end-to-end CoAP-based communications for the Web of Things , 2016, J. Netw. Comput. Appl..

[122]  Lixing Ding,et al.  Study on precision agriculture monitoring framework based on WSN , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.

[123]  Mohammad S. Obaidat,et al.  WHOMoVeS: An optimized broadband sensor network for military vehicle tracking , 2008, Int. J. Commun. Syst..

[124]  Eric Rescorla,et al.  Guidelines for Writing RFC Text on Security Considerations , 2003, RFC.

[125]  L. V. Doorn,et al.  SCUBA: Secure Code Update By Attestation in sensor networks , 2006, WiSe '06.

[126]  Matt Welsh,et al.  Integrating wireless sensor networks with the grid , 2004, IEEE Internet Computing.

[127]  Choong Seon Hong,et al.  Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous Traffic , 2008, MobiQuitous.

[128]  Ren C. Luo,et al.  Mobile Sensor Node Deployment and Asynchronous Power Management for Wireless Sensor Networks , 2012, IEEE Transactions on Industrial Electronics.

[129]  Yang Richard Yang,et al.  General AIMD congestion control , 2000, Proceedings 2000 International Conference on Network Protocols.

[130]  H. Balakrishnan,et al.  Mitigating congestion in wireless sensor networks , 2004, SenSys '04.

[131]  Daniel Minoli,et al.  Wireless Sensor Networks: Technology, Protocols, and Applications , 2007 .

[132]  Sanjay Kumar Madria,et al.  Energy constraint clustering algorithms for wireless sensor networks , 2013, Ad Hoc Networks.

[133]  Soma Bandyopadhyay,et al.  Lightweight mutual authentication for CoAP (WIP) , 2014 .

[134]  Ossama Younis,et al.  HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.

[135]  Jacques M. Bahi,et al.  An Optimized In-Network Aggregation Scheme for Data Collection in Periodic Sensor Networks , 2012, ADHOC-NOW.

[136]  Peilin Hong,et al.  A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks , 2013, J. Netw. Comput. Appl..

[137]  Arthur L. Liestman,et al.  A survey of gossiping and broadcasting in communication networks , 1988, Networks.

[138]  Randy Bush,et al.  Serial Number Arithmetic , 1996, RFC.

[139]  Olaf Bergmann,et al.  Datagram Transport Layer Security in Constrained Environments , 2012 .

[140]  Richard P. Martin,et al.  Detecting and Localizing Identity-Based Attacks in Wireless and Sensor Networks , 2010, IEEE Transactions on Vehicular Technology.

[141]  Matthias Hollick,et al.  Survey on Wireless Sensor Network Technologies for Industrial Automation: The Security and Quality of Service Perspectives , 2010, Future Internet.

[142]  Yeong-Jee Chung,et al.  Self-Organization Routing Protocol Supporting Mobile Nodes for Wireless Sensor Network , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).

[143]  Sheng Zhong,et al.  Privacy-Preserving Location-based Services for Mobile Users in Wireless Networks , 2004 .

[144]  Dominique Guinard,et al.  Embedding internet technology for home automation , 2010, 2010 IEEE 15th Conference on Emerging Technologies & Factory Automation (ETFA 2010).

[145]  Li Qing,et al.  Design of a distributed energy-efficient clustering algorithm for heterogeneous wireless sensor networks , 2006, Comput. Commun..

[146]  Chih-Heng Ke,et al.  Modeling and Analysis of Frame-Level Forward Error Correction for MPEG Video over Burst-Loss Channels , 2014 .

[147]  Vinh Tran-Quang,et al.  A transmission range adjustment algorithm to avoid energy holes in wireless sensor networks , 2010, 8th Asia-Pacific Symposium on Information and Telecommunication Technologies.

[148]  Frank Stajano,et al.  The Resurrecting Duckling , 1999 .

[149]  Wen-Chung Chang,et al.  Detecting Sybil attacks in Wireless Sensor Networks using neighboring information , 2009, Comput. Networks.

[150]  Pankaj K. Agarwal,et al.  Exact and Approximation Algortihms for Clustering , 1997 .

[151]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.