A Secure Clustering Protocol With Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks

[1]  Guangquan Xu,et al.  A Secure Random Key Distribution Scheme Against Node Replication Attacks in Industrial Wireless Sensor Systems , 2020, IEEE Transactions on Industrial Informatics.

[2]  Hanady M. Abdulsalam,et al.  Trust Based Scheme for IoT Enabled Wireless Sensor Networks , 2018, Wireless Personal Communications.

[3]  Mianxiong Dong,et al.  ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks , 2016, IEEE Transactions on Information Forensics and Security.

[4]  Hoon Oh,et al.  A Slotted Sense Multiple Access Protocol for Timely and Reliable Data Transmission in Dynamic Wireless Sensor Networks , 2018, IEEE Sensors Journal.

[5]  Jianfeng Ma,et al.  A Mutual Evaluation Based Trust Management Method for Wireless Sensor Networks , 2017 .

[6]  Ganapathy Sannasi,et al.  QoS Aware Trust Based Routing Algorithm for Wireless Sensor Networks , 2019, Wireless Personal Communications.

[7]  Ali Ghaffari,et al.  Secure and Trust-Aware Routing Scheme in Wireless Sensor Networks , 2019, Wireless Personal Communications.

[8]  Farookh Khadeer Hussain,et al.  A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT) , 2018, Computing.

[9]  Susan Augustine,et al.  Taylor kernel fuzzy C-means clustering algorithm for trust and energy-aware cluster head selection in wireless sensor networks , 2020, Wirel. Networks.

[10]  Antonio Jesús Yuste-Delgado,et al.  EUDFC - Enhanced Unequal Distributed Type-2 Fuzzy Clustering Algorithm , 2019, IEEE Sensors Journal.

[11]  Yu He,et al.  Fault-Tolerant Event Region Detection on Trajectory Pattern Extraction for Industrial Wireless Sensor Networks , 2020, IEEE Transactions on Industrial Informatics.

[12]  Liu Yang,et al.  A Dynamic Behavior Monitoring Game-Based Trust Evaluation Scheme for Clustering in Wireless Sensor Networks , 2018, IEEE Access.

[13]  Abdul Hanan Abdullah,et al.  A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing , 2017, IEEE Access.

[14]  Mohammed Atiquzzaman,et al.  Data Collection for Security Measurement in Wireless Sensor Networks: A Survey , 2019, IEEE Internet of Things Journal.

[15]  Yue Cao,et al.  A Critical Analysis of Research Potential, Challenges, and Future Directives in Industrial Wireless Sensor Networks , 2018, IEEE Communications Surveys & Tutorials.

[16]  Kamalrulnizam Abu Bakar,et al.  Energy-aware and secure routing with trust for disaster response wireless sensor network , 2017, Peer-to-Peer Netw. Appl..

[17]  Mohsen Guizani,et al.  An SNR-Assured Anti-Jamming Routing Protocol for Reliable Communication in Industrial Wireless Sensor Networks , 2018, IEEE Communications Magazine.

[18]  Shalini Batra,et al.  Fuzzy‐based trust prediction for effective coordination in vehicular ad hoc networks , 2017, Int. J. Commun. Syst..

[19]  Xiaoping Li,et al.  A Trust Management System for Securing Data Plane of Ad-Hoc Networks , 2016, IEEE Transactions on Vehicular Technology.

[20]  Yun Liu,et al.  Double Cluster Heads Model for Secure and Accurate Data Fusion in Wireless Sensor Networks , 2015, Sensors.

[21]  Tong Zhang,et al.  Trust evaluation method for clustered wireless sensor networks based on cloud model , 2016, Wirel. Networks.

[22]  Pengfei Zhang,et al.  Adaptive Duty Cycling in Sensor Networks With Energy Harvesting Using Continuous-Time Markov Chain and Fluid Models , 2015, IEEE Journal on Selected Areas in Communications.

[23]  Kamalrulnizam Abu Bakar,et al.  A Secure Routing Protocol with Trust and Energy Awareness for Wireless Sensor Network , 2016, Mob. Networks Appl..

[24]  Dongrui Wu,et al.  Recommendations on Designing Practical Interval Type-2 Fuzzy Systems , 2019, Eng. Appl. Artif. Intell..

[25]  Saad A. Al-Ahmadi,et al.  Energy Preserving Secure Measure Against Wormhole Attack in Wireless Sensor Networks , 2019, IEEE Access.

[26]  Dongrui Wu,et al.  On the Fundamental Differences Between Interval Type-2 and Type-1 Fuzzy Logic Controllers , 2012, IEEE Transactions on Fuzzy Systems.

[27]  Wei Chen,et al.  TMSRS: trust management-based secure routing scheme in industrial wireless sensor network with fog computing , 2020, Wirel. Networks.

[28]  Abdulhamid Zahedi,et al.  An energy-aware trust-based routing algorithm using gravitational search approach in wireless sensor networks , 2019, Peer-to-Peer Netw. Appl..

[29]  Jianqiang Yi,et al.  Interval type-2 fuzzy logic based transmission power allocation strategy for lifetime maximization of WSNs , 2020, Eng. Appl. Artif. Intell..