References
- Saidi, Ahmed, Khelifa Benahmed, and Nouredine Seddiki. “Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks.” Ad Hoc Networks 106 (2020): 102215. doi: https://doi.org/10.1016/j.adhoc.2020.102215
- Nangue, Audrey, Elie Fute Tagne, and Emmanuel TONYE. “Robust and Accurate Trust Establishment Scheme for Wireless Sensor Network.” International Journal of Computer Network & Information Security 12, no. 6 (2020). doi: https://doi.org/10.5815/ijcnis.2020.06.02
- Farhana Jabeen, Zara Hamid, Adnan Akhunzada, Wadood Abdul, and Sanaa Ghouzali “Trust and Reputation Management in Healthcare Systems: Taxonomy, Requirements and Open Issues” IEEE 2018, VOLUME 6, 2018.
- Yi Ren, Vladimir I. Zadorozhny, Vladimir A. Oleshchuk, and Frank Y. Li, “A Novel Approach to Trust Management in Unattended Wireless Sensor Networks” IEEE Transactions on Mobile Computing, Vol. 13, NO. 7, JULY 2014 doi: https://doi.org/10.1109/TMC.2013.22
- Renjian Feng, Xiaofeng Xu, Xiang Zhou and Jiangwen Wan “A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory” Sensors 2011, 11
- Fenye Bao, Ing-Ray Chen, Moon Jeong Chang, and Jin-Hee Cho “Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection” IEEE Transactions on Network and Service Management, Vol. 9, No. 2, JUNE 2012. doi: https://doi.org/10.1109/TCOMM.2012.031912.110179
- Khan, Tayyab, Karan Singh, and Kamlesh C. Purohit. “ICMA: An Efficient Integrated Congestion Control Approach.” Recent Patents on Engineering 14, no. 3 (2020): 294-309. doi: https://doi.org/10.2174/1872212114666191231150916
- Kumar, Anand, Karan Singh, and Tayyab Khan. “L-RTAM: Logarithm based reliable trust assessment model for WBSNs.” Journal of Discrete Mathematical Sciences and Cryptography (2021): 1-16. doi: https://doi.org/10.1080/09720529.2021.1880145
- Khan, Tayyab, and Karan Singh. “Resource management based secure trust model for WSN.” Journal of Discrete Mathematical Sciences and Cryptography 22, no. 8 (2019): 1453-1462. doi: https://doi.org/10.1080/09720529.2019.1695897
- D. Yuvaraj, M. Sivaram & S. Navaneetha Krishnan (2020) Intelligent detection of untrusted data transmission to optimize energy in sensor networks, Journal of Information and Optimization Sciences, 41:3, 799-811, DOI: https://doi.org/10.1080/02522667.2019.1616910
- Kakelli Anil Kumar, Addepalli V. N. Krishna & K. Shahu Chatrapati (2017) New secure routing protocol with elliptic curve cryptography for military heterogeneous wireless sensor networks, Journal of Information and Optimization Sciences, 38:2, 341-365, DOI: https://doi.org/10.1080/02522667.2016.1220092
- Saneh Lata Yadav & R. L. Ujjwal (2020) Sensor data fusion and clustering : A congestion detection and avoidance approach in wireless sensor networks, Journal of Information and Optimization Sciences, 41:7, 1673-1688, DOI: https://doi.org/10.1080/02522667.2020.1799512.
- Rashmi Singh, Ashish Joshi, A.K. Mohapatra & V.N. Jha (2021) Anefficient implementation of revocable functionality in authentication protocol for wireless body area network, Journal of Information and Optimization Sciences, 42:2, 321-331, DOI: https://doi.org/10.1080/02522667.2019.1658417
- Sachin Lalar, Shashi Bhushan & Surender (2019) An efficient tree-based clone detection scheme in wireless sensor network, Journal of Information and Optimization Sciences, 40:5, 1003-1023, DOI: https://doi.org/10.1080/02522667.2019.1637998
- A. Shakiba (2019) Security analysis for chaotic maps-based mutual authentication and key agreement using smart cards for wireless networks, Journal of Information and Optimization Sciences, 40:3, 725-750, DOI: https://doi.org/10.1080/02522667.2018.1470752