Energy-aware and secure routing with trust for disaster response wireless sensor network
暂无分享,去创建一个
Kamalrulnizam Abu Bakar | Khalid Haseeb | Abdul Waheed Khan | Adnan Ahmed | Muhammad Ibrahim Channa | Abdul Waheed Khan | K. A. Bakar | K. Haseeb | Adnan Ahmed | M. Channa
[1] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[2] Chong Shen,et al. Modeling FOG Drift Using Back-Propagation Neural Network Optimized by Artificial Fish Swarm Algorithm , 2014, J. Sensors.
[3] Ayman I. Kayssi,et al. CENTERA: A Centralized Trust-Based Efficient Routing Protocol with Authentication for Wireless Sensor Networks † , 2015, Sensors.
[4] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[5] Dimitrios D. Vergados,et al. Energy-Efficient Routing Protocols in Wireless Sensor Networks: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[6] Kazi M. Ahmed,et al. A Reliable Routing Scheme for Post-Disaster Ad Hoc Communication Networks , 2011, J. Commun..
[7] Subhash Challa,et al. Survey of trust models in different network domains , 2010, ArXiv.
[8] Hui Li,et al. Natural Disaster Monitoring with Wireless Sensor Networks: A Case Study of Data-intensive Applications upon Low-Cost Scalable Systems , 2013, Mob. Networks Appl..
[9] Ming Gu,et al. Trust Based Routing for Misbehavior Detection in Ad Hoc Networks , 2010, J. Networks.
[10] Ahmed Helmy,et al. Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[11] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[12] Heejo Lee,et al. Privacy and Trust Management Schemes of Wireless Sensor Networks: A Survey , 2010 .
[13] Hongke Zhang,et al. TC-BAC: A trust and centrality degree based access control model in wireless sensor networks , 2013, Ad Hoc Networks.
[14] Laura Gheorghe,et al. Trust and Energy-aware Routing Protocol for Wireless Sensor Networks , 2012, ICWMC 2012.
[15] William H. Allen,et al. RAAODV: a reputation-aware AODV for mobile ad hoc networks , 2014, ACM Southeast Regional Conference.
[16] Mary Baker,et al. Observation-based Cooperation Enforcement in Ad Hoc Networks , 2003, ArXiv.
[17] Bo Wang,et al. A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..
[18] Matt Welsh,et al. Sensor networks for emergency response: challenges and opportunities , 2004, IEEE Pervasive Computing.
[19] Yuqing Zhang,et al. Dealing with dishonest recommendation: The trials in reputation management court , 2012, Ad Hoc Networks.
[20] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[21] Dong Yang,et al. TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks , 2014, Int. J. Distributed Sens. Networks.
[22] Susanne Wetzel,et al. Cryptographic Versus Trust-based Methods for MANET Routing Security , 2008, STM@ESORICS.
[23] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[24] Theodore B. Zahariadis,et al. Combining trust with location information for routing in wireless sensor networks , 2012, Wirel. Commun. Mob. Comput..
[25] Prasant Mohapatra,et al. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.
[26] Nabeel Ahmed,et al. SAFIRE: A Self-Organizing Architecture for Information Exchange between First Responders , 2007, 2007 2nd IEEE Workshop on Networking Technologies for Software Define Radio Networks.
[27] Sajal K. Das,et al. A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks , 2012, IEEE Transactions on Dependable and Secure Computing.
[28] Yuguang Fang,et al. A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[29] Kai Chen,et al. Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network , 2015, J. Sensors.
[30] Chunyan Miao,et al. Towards a trust aware cognitive radio architecture , 2009, MOCO.
[31] Theodore B. Zahariadis,et al. A Novel Trust-Aware Geographical Routing Scheme for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..
[32] Suman Deb Roy,et al. Trust Management in Ad Hoc Network for Secure DSR Routing , 2008 .
[33] Kai-Di Chang,et al. A Survey of Trust Management in WSNs, Internet of Things and Future Internet , 2012 .
[34] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[35] José Manuel Moya,et al. Using Reputation Systems and Non-Deterministic Routing to Secure Wireless Sensor Networks , 2009, Sensors.
[36] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[37] Ananthram Swami,et al. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..
[38] Qing Zhang,et al. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks , 2008, TSEC.
[39] Aziz Mohaisen,et al. On the Insecurity of Asymmetric Key-based Architecture in Wireless Sensor Networks , 2009, KSII Trans. Internet Inf. Syst..
[40] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[41] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[42] Hongmei Deng,et al. Trust-Aware In-Network Aggregation for Wireless Sensor Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[43] Zinaida Benenson,et al. Tampering with Motes: Real-World Physical Attacks on Wireless Sensor Networks , 2006, SPC.
[44] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[45] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[46] Wei Zhou,et al. DistressNet: a wireless ad hoc and sensor network architecture for situation management in disaster response , 2010, IEEE Communications Magazine.
[47] Rodrigo Roman,et al. A Survey on the Applicability of Trust Management Systems for Wireless Sensor Networks , 2007, Third International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2007).
[48] Stavros A. Koubias,et al. Architecture Design and Implementation of an Ad-Hoc Network for Disaster Relief Operations , 2007, IEEE Transactions on Industrial Informatics.
[49] Raja Datta,et al. Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..
[50] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[51] Choong Seon Hong,et al. An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks , 2008, KSII Trans. Internet Inf. Syst..
[52] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[53] Rahim Tafazolli,et al. An Energy-Efficient Clustering Solution for Wireless Sensor Networks , 2011, IEEE Transactions on Wireless Communications.
[54] Cong Wang,et al. A Secure Routing Protocol for Cluster-Based Wireless Sensor Networks Using Group Key Management , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[55] Teerawat Issariyakul,et al. Introduction to Network Simulator NS2 , 2008 .
[56] Sherali Zeadally,et al. Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.
[57] Shukor Abd Razak,et al. Trust-Based Routing Mechanism in MANET: Design and Implementation , 2013, Mob. Networks Appl..