An Energy Efficient and Trust Aware Framework for Secure Routing in LEACH for Wireless Sensor Networks
暂无分享,去创建一个
Gaurav Sharma | Arzoo Miglani | Tarunpreet Bhatia | Gulshan Shrivastava | Gulshan Shrivastava | G. Sharma | T. Bhatia | Arzoo Miglani
[1] Guangjie Han,et al. Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..
[2] Miodrag Potkonjak,et al. Smart kindergarten: sensor-based wireless networks for smart developmental problem-solving environments , 2001, MobiCom '01.
[3] R. M. Chandrasekaran,et al. A Novel Heuristic Approach Based Trust Worthy Architecture for Wireless Sensor Networks , 2013, Wirel. Pers. Commun..
[4] Ayman I. Kayssi,et al. Fuzzy reputation-based trust model , 2011, Appl. Soft Comput..
[5] David A. Wagner,et al. TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.
[6] Weisong Shi,et al. Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs , 2012, IEEE Transactions on Dependable and Secure Computing.
[7] Subir Kumar Sarkar,et al. Issues in Wireless Sensor Networks , 2008 .
[8] Fei Du,et al. An Improvement of LEACH Routing Protocol Based on Trust for Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[9] Peng Zhou,et al. Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs , 2015, IEEE Transactions on Information Forensics and Security.
[10] Hongke Zhang,et al. TC-BAC: A trust and centrality degree based access control model in wireless sensor networks , 2013, Ad Hoc Networks.
[11] Weisong Shi,et al. TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks , 2010, EWSN.
[12] Liu Ming,et al. Grey Theory Based Nodes Risk Assessment in P2P Networks , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[13] Cauligi S. Raghavendra,et al. PEGASIS: Power-efficient gathering in sensor information systems , 2002, Proceedings, IEEE Aerospace Conference.
[14] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[15] Xiao Wang,et al. Trust Management Scheme Based on D-S Evidence Theory for Wireless Sensor Networks , 2013, Int. J. Distributed Sens. Networks.
[16] Theodore B. Zahariadis,et al. Combining trust with location information for routing in wireless sensor networks , 2012, Wirel. Commun. Mob. Comput..
[17] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[18] R.K. Patro. Localization in wireless sensor network with mobile beacons , 2004, 2004 23rd IEEE Convention of Electrical and Electronics Engineers in Israel.
[19] Wendi B. Heinzelman,et al. Negotiation-Based Protocols for Disseminating Information in Wireless Sensor Networks , 2002, Wirel. Networks.
[20] Baohua Zhao,et al. Trust-Based LEACH Protocol for Wireless Sensor Networks , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[21] Weisong Shi,et al. Building a Trust-Aware dynamic routing solution for Wireless Sensor Networks , 2010, 2010 IEEE Globecom Workshops.
[22] M. R. Tripathy,et al. Routing Protocols in Wireless Sensor Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[23] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[24] Tae Kyung Kim,et al. A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .
[25] Yuguang Fang,et al. A Formal Study of Trust-Based Routing in Wireless Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[26] M. Weiser. The Computer for the Twenty-First Century , 1991 .
[27] Mads Haahr,et al. Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.
[28] Shamsad Parvin,et al. Routing Protocols for Wireless Sensor Networks: A Comparative Study , 2008 .
[29] Nadeem Javaid,et al. MODLEACH: A Variant of LEACH for WSNs , 2013, 2013 Eighth International Conference on Broadband and Wireless Computing, Communication and Applications.
[30] L. M. M.-T.. Theory of Probability , 1929, Nature.
[31] M. Salem. An Efficient Distributed Trust Model for Wireless Sensor Networks , 2016 .
[32] K. Vinoth Kumar,et al. Secure Routing Path Using Trust Values for Wireless Sensor Networks , 2014, ArXiv.
[33] Subhash Challa,et al. Survey of trust models in different network domains , 2010, ArXiv.
[34] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[35] J. Martin Leo Manickam,et al. Fuzzy-Based Trust Prediction Model for Routing in WSNs , 2014, TheScientificWorldJournal.
[36] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[37] Wendi B. Heinzelman,et al. Adaptive protocols for information dissemination in wireless sensor networks , 1999, MobiCom.
[38] Anand Gudnavar,et al. Improved cluster routing protocol for wireless sensor network through simplification , 2012, 2012 18th International Conference on Advanced Computing and Communications (ADCOM).
[39] Sanjay Kumar Madria,et al. A Secure Data Aggregation Based Trust Management Approach for Dealing with Untrustworthy Motes in Sensor Network , 2011, 2011 International Conference on Parallel Processing.
[40] Marco Chiani,et al. Cooperative Diversity in Wireless Sensor Networks , 2005 .
[41] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[42] N. Pissinou,et al. A framework for trust-based cluster head election in wireless sensor networks , 2006, Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems.
[43] Na Wang,et al. A Light-Weighted Data Trust Model in WSN , 2014 .
[44] Sudip Misra,et al. Guide to Wireless Sensor Networks , 2009, Computer Communications and Networks.
[45] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .