153
Views
16
CrossRef citations to date
0
Altmetric
Articles

Trust and Location-Aware Routing Protocol for Wireless Sensor Networks

&

REFERENCES

  • J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Comput. Netw., Vol. 52, no. 12, pp. 2292–330, Aug. 2008.
  • C. Karlof, and D. Wagner, “Secure routing in wireless sensor networks: Attacks and countermeasures,” Ad Hoc Netw., Vol. 1, no. 2, pp. 293–315, Sep. 2003.
  • Y. Yu, K. Li, W. Zhou, and P. Li, “Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures,” J. Netw. Comput. Appl., Vol. 35, no. 3, pp. 867–80, May 2012.
  • A. Jsang, and R. Ismail, “The beta reputation system,” in Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, 2002, pp. 2502–11.
  • J. He, J. Xu, X. Zhu, Y. Zhang, T. Zhang, and W. Fu, “Reputation-based secure sensor localization in wireless sensor networks,” Sci. World J., Vol. 2014, pp. 1–10, May 2014.
  • F. Bao, I.- R. Chen, M. Chang, and J.- H. Cho, “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,” IEEE Trans. Netw. Service Manage., Vol. 9, no. 2, pp. 169–83, Jun. 2012.
  • Y. Sun, H. Luo, and S. K. Das, “A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks,” IEEE Trans. Dependable Secure Comput., Vol. 9, no. 6, pp. 785–97, Sep. 2012.
  • P. R. Vamsi, and K. Kant, “Secure data aggregation and intrusion detection in wireless sensor networks,” in 2015 International Conference on Signal Processing and Communication, Noida, India, 2015, pp. 127–3.
  • M. J. Probst, and S. K. Kasera, “Statistical trust establishment in wireless sensor networks,” in International Conference on Parallel and Distributed Systems, Hsinchu, Taiwan, 2007, pp. 1–8.
  • N. Abu-Ghazaleh, K.- D. Kang, and K. Liu, “Towards resilient geographic routing in wsns,” in Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, 2005, Montreal, Canada, pp. 71–8.
  • K. -S. Hung, K. -S. Lui, and Y. -K. Kwok, “A trust-based geographical routing scheme in sensor networks,” in IEEE Wireless Communications and Networking Conference, 2007, Kowloon, Hong Kong, pp. 3123–7.
  • A. A. Pirzada, and C. McDonald, “Trusted greedy perimeter stateless routing,” in 15th IEEE International Conference on Networks, Adelaide, Australia, 2007, pp. 206–11.
  • G. Zhang, Y. Zhang, Z. Chen, and P. Csermely, “Using trust to secure geographic and energy aware routing against multiple attacks,” PlOS One, Vol. 8, no. 10, p. e77488, Oct. 2013.
  • J. Duan, D. Yang, H. Zhu, S. Zhang, and J. Zhao, “Tsrf: A trust-aware secure routing framework in wireless sensor networks,” Int. J. Distrib. Sensor Netw., Vol. 2014, pp. 1–14, Jan. 2014.
  • T. Zahariadis, P. Trakadas, H. C. Leligou, S. Maniatis, and P. Karkazis, “A novel trust-aware geographical routing scheme for wireless sensor networks,” Wirel. Pers. Commun., Vol. 69, no. 2, pp. 805–26, Apr. 2013.
  • M. Xiang, Q. Bai, and W. Liu, “Trust-based adaptive routing for smart grid systems,” J. Inf. Process., Vol. 22, no. 2, pp. 210–8, Apr. 2014.
  • P. R. Vamsi, and K. Kant, “Self adaptive trust model for secure geographic routing in wireless sensor networks,” Int. J. Intell. Syst. Appl., Vol. 7, no. 3, p. 21, Mar. 2015.
  • K. Akkaya, and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad Hoc Netw., Vol. 3, no. 3, pp. 325–49, May 2005.
  • B. Karp, and H. -T. Kung, “Gpsr: Greedy perimeter stateless routing for wireless networks,” in Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Bostan, MA 2000, pp. 243–54.
  • Y. -J. Kim, R. Govindan, B. Karp, and S. Shenker, “Geographic routing made practical,” in Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, Berkeley, CA, 2005, pp. 217–30.
  • “Cc2431 data sheet.” Available: www.ti.com/cn/lit/gpn/cc2431. Accessed: 2015-05-10.
  • O. Khalid, S. U. Khan, S. A. Madani, K. Hayat, M. I. Khan, N. Min-Allah, J. Kolodziej, L. Wang, S. Zeadally, and D. Chen, “Comparative study of trust and reputation systems for wireless sensor networks,” Secur. Commun. Netw., Vol. 6, no. 6, pp. 669–88, Jun. 2013.
  • P. R. Vamsi, and K. Kant, “Systematic design of trust management systems for wireless sensor networks: A review,” in 2014 Fourth International Conference on Advanced Computing & Communication Technologies, Rohtak, India, 2014, pp. 208–15.
  • D. He, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos, “Retrust: Attack-resistant and lightweight trust management for medical sensor networks,” IEEE Trans. Inform. Technol. Biomedicine, Vol. 16, no. 4, pp. 623–32, Apr. 2012.
  • E. ElSalamouny, K. T. Krukow, and V. Sassone, “An analysis of the exponential decay principle in probabilistic trust models,” Theoretical Comput. Sci., Vol. 410, no. 41, pp. 4067–84, Sep. 2009.
  • “Network simulator ns-2.35.” Available: http://www.isi.edu/nsnam/ns. Accessed: 2015-05-10.
  • “Gpsr source code.” Available: http://www.cs.cmu.edu/bkarp/gpsr/gpsr.html. Accessed: 2015-05-10.
  • “Atsr source code.” Available: http://www.ee.teihal.gr/professors/voliotis/digilab_site/ATSR_Home.html. Accessed: 2015-05-10.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.