125
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Hop-by-hop trust evaluation algorithm for identity anonymous sensor networks

&

References

  • G. Han, J. Jiang, L. Shu, J. Niu, and H.-C. Chao, “Management and applications of trust in wireless sensor networks: A survey,” J. Comput. Syst. Sci., Vol. 80, no. 3, pp. 602–17, May 2014.
  • N. A. Pantazis, S. A. Nikolidakis, and D. D. Vergados, “Energy-efficient routing protocols in wireless sensor networks: A survey,” IEEE Commun. Surv. Tut., Vol. 15, no. 2, pp. 551–91, May 2013.
  • S. Misra and G. Xue, “Efficient anonymity schemes for clustered wireless sensor networks,” Int. J. Sens. Netw., Vol. 1, no. 1, pp. 50–63, Sept. 2006.
  • Y. L. Sun and Z. Han, “Trusted cooperative transmissions: Turning a security weakness into a security enhancement,” in Liu, R. and Trappe, W. Eds., Securing Wireless Communications at the Physical Layer. New York, NY: Springer, 2010, pp. 355–77.
  • S. Cui, A. J. Goldsmith, and A. Bahai, “Energy-efficiency of MIMO and cooperative MIMO techniques in sensor networks,” IEEE J. Sel. Areas Commun., Vol. 22, no. 6, pp. 1089–98, Aug. 2004.
  • M.-S. Huang and R. M. Narayanan, “Trilateration-based localization algorithm using the lemoine point formulation,” IETE J. Res., Vol. 60, no. 1, pp. 60–73, Jan.–Feb. 2014.
  • Z. Huang, “On reputation and data-centric misbehavior detection mechanisms for vanet,” PhD dissertation, Ottawa, Canada: University of Ottawa, 2011.
  • T. Roosta, M. Manzo, and S. Sastry, “Time synchronization attacks in sensor networks,” in Poovendran, R., Roy, S. and Wang, C., Eds., Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. New York, NY: Springer US, 2007, pp. 325–45.
  • G. Chen, J. Branch, M. Pflug, L. Zhu, and B. Szymanski, “SENSE: A wireless sensor network simulator,” in Advances in Pervasive Computing and Networking, B. Szymanski and B. Yener, Eds. New York, NY: Springer, 2005, pp. 249–67.
  • M. Zorzi and R. R. Rao, “Geographic random forwarding (GeRaF) for ad hoc and sensor networks: multihop performance,” IEEE Trans. Mobile Comput., Vol. 2, no. 4, pp. 337–48, Oct.–Dec. 2003.
  • H. Alzaid, E. Foo, J. G. Nieto, and E. Ahmed, “Mitigating on-off attacks in reputation-based secure data aggregation for wireless sensor networks,” Sec. Commun. Netw., Vol. 5, no. 2, pp. 125–144, Feb. 2012.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.