35
Views
5
CrossRef citations to date
0
Altmetric
Articles

Resource management based secure trust model for WSN

&

References

  • Fragkakis, Michail, Nikolaos Alexandris, and Fotis Georgiakodis. “A survey on the trust and security models of mobile agent platforms.” Journal of Discrete Mathematical Sciences and Cryptography vol. 15, no. 1, pp. 31-47 (2012). doi: 10.1080/09720529.2012.10698362
  • Yi Ren, Vladimir I. Zadorozhny, Vladimir A. Oleshchuk, and Frank Y. Li, “A Novel Approach to Trust Management in Unattended Wireless Sensor Networks” IEEE Transactions on Mobile Computing, VOL. 13, NO. 7, (2014). doi: 10.1109/TMC.2013.22
  • Joshi, Ashish, and Amar Kumar Mohapatra. “Authentication protocols for wireless body area network with key management approach.” Journal of Discrete Mathematical Sciences and Cryptography, vol. 22, no. 2, pp. 219-240, (2019). doi: 10.1080/09720529.2019.1582869
  • Shuaishuai Tan, Xiaoping Li, and Qingkuan Dong “A Trust Management System for Securing Data Plane of Ad-Hoc Networks” IEEE Transactions on Vehicular Technology, VOL. 65, NO. 9, (2016) doi: 10.1109/TVT.2015.2495325
  • Miao Zhang “Trust Computation Model Based on Improved Bayesian for Wireless Sensor Networks” 17th IEEE International Conference on Communication Technology (2017).
  • Dai, Liang, Yilin Chang, and Zhong Shen. “An optimal task scheduling algorithm in wireless sensor networks.” International Journal of Computers Communications & Control vol. 6, no. , pp. 101-112, (2011).
  • Xiaoyong Li, Feng Zhou, and Junping Du “LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks” IEEE Transactions on Information Forensics and Security, VOL. 8, NO. 6, (2013).
  • Moutushi Singh, Abdur Rahaman Sardar, Koushik Majumder & Subir Kumar Sarkar “A Lightweight Trust Mechanism and Overhead Analysis for Clustered WSN” IETE Journal of Research, (2017)
  • Guo, Fuchun, Yi Mu, and Zhide Chen. “Multi-identity management for identity-based cryptography.” Journal of Discrete Mathematical Sciences and Cryptography,vol. 11, no. 6, pp. 639-672 (2008). doi: 10.1080/09720529.2008.10698396
  • Chatterjee, Punyasha, and Nabanita Das. “Multiple sink deployment in multi-hop wireless sensor networks to enhance lifetime.” Applications and Innovations in Mobile Computing (AIMoC), IEEE, (2015).
  • Shaikh, Riaz Ahmed, Hassan Jameel, Brian J. d’Auriol, Heejo Lee, Sungyoung Lee, and Young-Jae Song. “Group-based trust management scheme for clustered wireless sensor networks.” IEEE transactions on parallel and distributed systems vol. 20, no. 11, pp. 1698-1712, (2009). doi: 10.1109/TPDS.2008.258
  • Khan, Tayyab, Karan Singh, Mohamed Abdel-Basset, Hoang Viet Long, Satya P. Singh, and Manisha Manjul. “A Novel and Comprehensive Trust Estimation Clustering-Based Approach for Large Scale Wireless Sensor Networks.” IEEE Access, vol. 7, pp. 58221-58240, (2019). doi: 10.1109/ACCESS.2019.2914769
  • Said Talbi, “Adaptive and dual data-communication trust scheme for clustered wireless sensor networks”, Telecommun Syst, Springer, (2017).
  • Zhang, Junqi, et al. “A trust management architecture for hierarchical wireless sensor networks.” IEEE Local Computer Network Conference. IEEE, (2010).
  • Renjian Feng, Xiaofeng Xu, Xiang Zhou, and Jiangwen Wan “ A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory” Sensors (2011).
  • Fenye Bao, Ing-Ray Chen, MoonJeong Chang, and Jin-Hee Cho “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection” IEEE Transactions on Network and Service Management, VOL. 9, NO. 2, (2012). doi: 10.1109/TCOMM.2012.031912.110179
  • Riaz Ahmed Shaikh, Hassan Jameel, Sungyoung Lee, Saeed Rajput, and Young Jae Song “Trust Management Problem in Distributed Wireless Sensor Networks” IEEE (2006).
  • S. Karthik, K. Vanitha, Dr. G. Radhamani “Trust Management Techniques in Wireless Sensor Networks: An Evaluation” IEEE (2011).

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.