REFERENCES
- J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Comput. Netw., Vol. 52, no. 12, pp. 2292–330, Aug. 2008.
- C. Karlof, and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Ad Hoc Netw., Vol. 1, no. 2, pp. 293–315, Sep. 2003.
- Y. Yu, K. Li, W. Zhou, and P. Li, “Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures,” J. Netw. Comput. Appl., Vol. 35, no. 3, pp. 867–80, May 2012.
- A. Jsang, and R. Ismail, “The beta reputation system,” in Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, 2002, pp. 2502–11.
- J. He, J. Xu, X. Zhu, Y. Zhang, T. Zhang, and W. Fu, “Reputation-based secure sensor localization in wireless sensor networks,” Sci. World J., Vol. 2014, pp. 1–10, May 2014.
- F. Bao, I.- R. Chen, M. Chang, and J.- H. Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,” IEEE Trans. Netw. Service Manage., Vol. 9, no. 2, pp. 169–83, Jun. 2012.
- Y. Sun, H. Luo, and S. K. Das, “A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks,” IEEE Trans. Dependable Secure Comput., Vol. 9, no. 6, pp. 785–97, Sep. 2012.
- P. R. Vamsi, and K. Kant, “Secure data aggregation and intrusion detection in wireless sensor networks,” in 2015 International Conference on Signal Processing and Communication, Noida, India, 2015, pp. 127–3.
- M. J. Probst, and S. K. Kasera, “Statistical trust establishment in wireless sensor networks,” in International Conference on Parallel and Distributed Systems, Hsinchu, Taiwan, 2007, pp. 1–8.
- N. Abu-Ghazaleh, K.- D. Kang, and K. Liu, “Towards resilient geographic routing in wsns,” in Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, 2005, Montreal, Canada, pp. 71–8.
- K. -S. Hung, K. -S. Lui, and Y. -K. Kwok, “A trust-based geographical routing scheme in sensor networks,” in IEEE Wireless Communications and Networking Conference, 2007, Kowloon, Hong Kong, pp. 3123–7.
- A. A. Pirzada, and C. McDonald, “Trusted greedy perimeter stateless routing,” in 15th IEEE International Conference on Networks, Adelaide, Australia, 2007, pp. 206–11.
- G. Zhang, Y. Zhang, Z. Chen, and P. Csermely, “Using trust to secure geographic and energy aware routing against multiple attacks,” PlOS One, Vol. 8, no. 10, p. e77488, Oct. 2013.
- J. Duan, D. Yang, H. Zhu, S. Zhang, and J. Zhao, “Tsrf: A trust-aware secure routing framework in wireless sensor networks,” Int. J. Distrib. Sensor Netw., Vol. 2014, pp. 1–14, Jan. 2014.
- T. Zahariadis, P. Trakadas, H. C. Leligou, S. Maniatis, and P. Karkazis, “A novel trust-aware geographical routing scheme for wireless sensor networks,” Wirel. Pers. Commun., Vol. 69, no. 2, pp. 805–26, Apr. 2013.
- M. Xiang, Q. Bai, and W. Liu, “Trust-based adaptive routing for smart grid systems,” J. Inf. Process., Vol. 22, no. 2, pp. 210–8, Apr. 2014.
- P. R. Vamsi, and K. Kant, “Self adaptive trust model for secure geographic routing in wireless sensor networks,” Int. J. Intell. Syst. Appl., Vol. 7, no. 3, p. 21, Mar. 2015.
- K. Akkaya, and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad Hoc Netw., Vol. 3, no. 3, pp. 325–49, May 2005.
- B. Karp, and H. -T. Kung, “Gpsr: Greedy perimeter stateless routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Bostan, MA 2000, pp. 243–54.
- Y. -J. Kim, R. Govindan, B. Karp, and S. Shenker, “Geographic routing made practical,” in Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, Berkeley, CA, 2005, pp. 217–30.
- “Cc2431 data sheet.” Available: www.ti.com/cn/lit/gpn/cc2431. Accessed: 2015-05-10.
- O. Khalid, S. U. Khan, S. A. Madani, K. Hayat, M. I. Khan, N. Min-Allah, J. Kolodziej, L. Wang, S. Zeadally, and D. Chen, “Comparative study of trust and reputation systems for wireless sensor networks,” Secur. Commun. Netw., Vol. 6, no. 6, pp. 669–88, Jun. 2013.
- P. R. Vamsi, and K. Kant, “Systematic design of trust management systems for wireless sensor networks: A review,” in 2014 Fourth International Conference on Advanced Computing & Communication Technologies, Rohtak, India, 2014, pp. 208–15.
- D. He, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos, “Retrust: Attack-resistant and lightweight trust management for medical sensor networks,” IEEE Trans. Inform. Technol. Biomedicine, Vol. 16, no. 4, pp. 623–32, Apr. 2012.
- E. ElSalamouny, K. T. Krukow, and V. Sassone, “An analysis of the exponential decay principle in probabilistic trust models,” Theoretical Comput. Sci., Vol. 410, no. 41, pp. 4067–84, Sep. 2009.
- “Network simulator ns-2.35.” Available: http://www.isi.edu/nsnam/ns. Accessed: 2015-05-10.
- “Gpsr source code.” Available: http://www.cs.cmu.edu/bkarp/gpsr/gpsr.html. Accessed: 2015-05-10.
- “Atsr source code.” Available: http://www.ee.teihal.gr/professors/voliotis/digilab_site/ATSR_Home.html. Accessed: 2015-05-10.