18
Views
7
CrossRef citations to date
0
Altmetric
Articles

Intelligent detection of untrusted data transmission to optimize energy in sensor networks

, &
Pages 799-811 | Received 01 Dec 2018, Published online: 30 Jun 2019

References

  • G. Han, X. Xu, J. Jiang, L. Shu, and N. Chilamkurti, “The Insights of Localization through Mobile Anchor Nodes in wireless Sensor Networks with Irregular Radio”, KSII Transactions Internet Inf. Systems, Vol. 6, pp. 2992–3007, (2012).
  • G. Han, J. Jiang, L. Shu, J. Niu, and H. C. Chao, “Managements and Applications of Trust in Wireless Sensor Networks: A Survey”, Journal of Computational Systems Sci., Vol. 80, Issue. 3, pp. 602–617, 2014. doi: 10.1016/j.jcss.2013.06.014
  • H. S. Lim, Y. S. Moon, and E. Bertino, “Provenance based Trustworthiness Assessment in Sensor Networks,” in Proceedings 7th International Workshop Data Management Sens. Networks, pp. 2–7, (2010).
  • V. C. Gungor, L. Bin, and G. P. Hancke, “Opportunities and Challenges of Wireless Sensor Networks in Smart Grid”, IEEE Trans. Ind. Electron., Vol. 57, Issue. 10, pp. 3557–3564, Oct. (2010). doi: 10.1109/TIE.2009.2039455
  • M. Rabbat and R. Nowak, “Distributed Optimization in Sensor Network”, in Proceedings 3rd Int. Symp. Inf. Process. Sens. Networks, pp. 20–27, (2004).
  • K. Shao, F. Luo, N. Mei, and Z. Liu, “Normal Distribution based Dynamical Recommendation Trust Model”, J. Software, Vol. 23, Issue 12, pp. 3130–3148, (2012). doi: 10.3724/SP.J.1001.2012.04204
  • R. Feng, X. Xu, X. Zhou, and J. Wan, “A Trust Evaluation Algorithm for Wireless Sensor Networks based on Node Behaviors and d-s Evidence Theory”, Sensors, Vol. 11, pp. 1345–1360, (2011). doi: 10.3390/s110201345
  • A. Josang, “An Algebra for Assessing Trust in Certification Chains, “in Proc. Networks Distributed Systems Security Symp. pp. 1–10, (1999).
  • H. Chan and A Perrig, “Security and Privacy in Sensor Networks, Computing, Vol. 36, Issue 10, pp. 103–105, Oct. (2003). doi: 10.1109/MC.2003.1236475
  • Y. M. Huang, M. Y. Hsieh, H. C. Chao, S. H. Hung, and J. H. Park, “Pervasive, Secure Access to a Hierarchical-based Healthcare Monitoring Architecture in Wireless Heterogeneous Sensor Networks”, IEEE J. Sel. Areas Commun., vol. 24, no. 7, pp. 400–411, May(2009).
  • S. Ganeriwal, L. K. Bolzano, and M. B. Srivastava, “Reputation based Framework for High Integrity Sensor Networks,” in Proc. 2nd ACM Workshop Security Ad Hoc Sensor Networks, pp. 66–77, (2004).
  • Z. Yao, D. Kim, and Y. Doh, “PLUS: Parameterized and Localized Trust Management Scheme for Sensor Networks Security”, in Proc. IEEE Int. Conf. Mobile Ad hoc Sensor Syst., pp. 437–446, (2008).
  • K. Govindan and P. Mohapatra, “Trust Computations and Trust Dynamics in Mobile Ad hoc Networks: A survey,” IEEE Commun. Surveys Tuts, vol. 14, no. 2, pp. 279–298, 2nd Quarter (2012). doi: 10.1109/SURV.2011.042711.00083
  • M. Sivaram and D. Yuvaraj, “he Real Problem Through a Selection Making an Algorithm that Minimizes the Computational Complexity” International Journal of Engineering and Advanced Technology (IJEAT), December 2018 V 8, Issue 2,P 1-6.
  • D. Yuvaraj, M. Sivaram, and V. Porkodi. “Detection and Removal Of Black Hole Attack In Mobile Ad Hoc Networks Using Grp Protocol.” International Journal of Advanced Research in Computer Science, V9, no. 6, Nov (2018), 1-6.
  • Santosh Durugkar & Ramesh C. Poonia Optimum utilization of natural resources for home garden using wireless sensor networks, Journal of Information and Optimization Sciences, 38:6, 1077-1085 (2017). doi: 10.1080/02522667.2017.1380391
  • Ramesh C. Poonia Integration of traffic and network simulators for vehicular ad-hoc networks, Journal of Information and Optimization Sciences, 39:7, 1583-1589, (2018). doi: 10.1080/02522667.2017.1406580
  • Kakelli Anil Kumar, Addepalli V. N. Krishna & K. Shahu Chatrapati New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks, Journal of Information and Optimization Sciences, 38:2, 341-365, (2017). doi: 10.1080/02522667.2016.1220092
  • Basant Agarwal, Namita Mittal, “Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques”, In 2nd International Conference on Communication, Computing & Security. Pp: 996-1003, (2012).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.