메뉴 건너뛰기




Volumn 17, Issue 1, 2012, Pages 75-89

Energy efficiency routing with node compromised resistance in wireless sensor networks

Author keywords

Energy efficiency; Node compromised; Trust management; Wireless sensor network

Indexed keywords

ADAPTIVE ROUTING; ANT COLONY OPTIMIZATION (ACO); COMPROMISED NODES; CRITICAL PROBLEMS; DATA COLLECTION; ENERGY EFFICIENT; FLOODING ATTACKS; FORWARDING NODES; INSIDE ATTACKS; MALICIOUS NODES; NETWORK LIFETIME; NODE COMPROMISED; ROUTING SCHEME; TRANSMISSION PATHS; TRUST MANAGEMENT; TRUST VALUES; WIRELESS SENSOR NETWORK (WSNS);

EID: 84861819969     PISSN: 1383469X     EISSN: None     Source Type: Journal    
DOI: 10.1007/s11036-010-0287-x     Document Type: Article
Times cited : (32)

References (35)
  • 1
    • 35648970070 scopus 로고    scopus 로고
    • Directional geographical routing for real-time video communications in wireless sensor networks
    • DOI 10.1016/j.comcom.2007.01.016, PII S0140366407000382, Concurrent Multipath Transport
    • Chen M, Leung V, Mao S, Yuan Y (2007) DGR: directional geographical routing for real-time video communications in wireless sensor networks. Elsevier Comput Commun 30(17):3368-3383 (Pubitemid 350026040)
    • (2007) Computer Communications , vol.30 , Issue.17 , pp. 3368-3383
    • Chen, M.1    Leung, V.C.M.2    Mao, S.3    Yuan, Y.4
  • 2
    • 77649089642 scopus 로고    scopus 로고
    • Multi-attribute data fusion for energy equilibrium routing in wireless sensor networks
    • Lin K,Wang L, Li K, Shu L (2010) Multi-attribute data fusion for energy equilibrium routing in wireless sensor networks. KSII Trans Internet Inf Syst 1(1):5-24
    • (2010) KSII Trans Internet Inf Syst , vol.1 , Issue.1 , pp. 5-24
    • Lin, K.1    Wang, L.2    Li, K.3    Shu, L.4
  • 3
    • 63049124905 scopus 로고    scopus 로고
    • RLRR: Receiveroriented load-balancing and reliable routing in in wireless sensor networks
    • Chen M, Leung V, Mao S, Kwon T (2009) RLRR: receiveroriented load-balancing and reliable routing in in wireless sensor networks. Wirel Commun Mobile Comput 9(3):405-416
    • (2009) Wirel Commun Mobile Comput , vol.9 , Issue.3 , pp. 405-416
    • Chen, M.1    Leung, V.2    Mao, S.3    Kwon, T.4
  • 4
    • 77955287816 scopus 로고    scopus 로고
    • Adaptive reliable routing based on cluster hierarchy for wirelessmultimedia sensor networks
    • Lin K, Chen M, Ge X (2010) Adaptive reliable routing based on cluster hierarchy for wirelessmultimedia sensor networks. EURASIP J Wirel Commun Netw 341-349
    • (2010) EURASIP J Wirel Commun Netw , pp. 341-349
    • Lin, K.1    Chen, M.2    Ge, X.3
  • 6
    • 70350009950 scopus 로고    scopus 로고
    • Game and balance multicast architecture algorithms for sensor grid
    • Fan Q, Wu Q, Magoules F, Xiong N, Vasilakos AV, He Y (2009) Game and balance multicast architecture algorithms for sensor grid. Sensors 9:7177-7202
    • (2009) Sensors , vol.9 , pp. 7177-7202
    • Fan, Q.1    Wu, Q.2    Magoules, F.3    Xiong, N.4    Vasilakos, A.V.5    He, Y.6
  • 7
    • 33846231481 scopus 로고    scopus 로고
    • MADD: Mobile-agent-based directed diffusion in wireless sensor networks
    • Chen M, Kwon T, Yuan Y, Choi Y, Leung V (2007) MADD: mobile-agent-based directed diffusion in wireless sensor networks. EURASIP J Appl Signal Process 2007(1):219-242
    • (2007) EURASIP J Appl Signal Process , vol.2007 , Issue.1 , pp. 219-242
    • Chen, M.1    Kwon, T.2    Yuan, Y.3    Choi, Y.4    Leung, V.5
  • 9
    • 70450204289 scopus 로고    scopus 로고
    • Hybrid geographical routing for flexible energy-delay tradeoffs
    • Chen M, Leung V, Mao S, Xiao Y, Chlamtac I (2009) Hybrid geographical routing for flexible energy-delay tradeoffs. IEEE Trans Veh Technol 58(9):4976-4988
    • (2009) IEEE Trans Veh Technol , vol.58 , Issue.9 , pp. 4976-4988
    • Chen, M.1    Leung, V.2    Mao, S.3    Xiao, Y.4    Chlamtac, I.5
  • 10
    • 30344473620 scopus 로고    scopus 로고
    • Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks
    • DOI 10.1016/j.comcom.2005.05.019, PII S0140366405002057
    • Chen M, Kwon T, Choi Y (2006) EDDD: energy-efficient differentiated directed diffusion (EDDD) for real-time traffic in wireless sensor networks. Elsevier Comput Commun 29(2):231-245 (Pubitemid 43065158)
    • (2006) Computer Communications , vol.29 , Issue.2 , pp. 231-245
    • Chen, M.1    Kwon, T.2    Choi, Y.3
  • 11
    • 62249146158 scopus 로고    scopus 로고
    • Directional controlled fusion in wireless sensor networks
    • Chen M, Leung V, Mao S (2009) Directional controlled fusion in wireless sensor networks. Mobile Netw Appl 14(2):220-229
    • (2009) Mobile Netw Appl , vol.14 , Issue.2 , pp. 220-229
    • Chen, M.1    Leung, V.2    Mao, S.3
  • 12
    • 37249036539 scopus 로고    scopus 로고
    • Applications and design issues for mobile agents in wireless sensor networks
    • DOI 10.1109/MWC.2007.4407223
    • Chen M, Gonzalez S, Leung V (2007) Applications and design issues of mobile agents in wireless sensor networks. Wirel Commun Mag 14(6):20-26 (Pubitemid 350281210)
    • (2007) IEEE Wireless Communications , vol.14 , Issue.6 , pp. 20-26
    • Chen, M.1    Gonzalez, S.2    Leung, V.C.M.3
  • 13
  • 14
    • 34047261116 scopus 로고    scopus 로고
    • Analytical modeling and mitigation techniques for the energy hole problem in sensor networks
    • DOI 10.1016/j.pmcj.2006.11.001, PII S1574119206000630
    • Li J, Mohapatra P (2007) Analytical model and mitigation techniques for the energy hole problems in sensor networks. Pervasive Mob Comput 3(8):233-254 (Pubitemid 46551955)
    • (2007) Pervasive and Mobile Computing , vol.3 , Issue.3 , pp. 233-254
    • Li, J.1    Mohapatra, P.2
  • 15
    • 33846455885 scopus 로고    scopus 로고
    • Energy optimal data propagation in wireless sensor networks
    • DOI 10.1016/j.jpdc.2006.10.007, PII S0743731506002176
    • Powell O, Leone P, Rolim J (2007) Energy optimal data propagation in wireless sensor networks. J Parallel Distrib Comput 67:302-317 (Pubitemid 46149235)
    • (2007) Journal of Parallel and Distributed Computing , vol.67 , Issue.3 , pp. 302-317
    • Powell, O.1    Leone, P.2    Rolim, J.3
  • 16
    • 33749636506 scopus 로고    scopus 로고
    • Energy balanced data propagation in wireless sensor networks
    • DOI 10.1007/s11276-006-6529-y, Special Issue: Selected Papers from WMAN '04
    • Efthymiou C, Nikoletseas S, Rolim J (2006) Energy balanced data propagation in wireless sensor networks. Wirel Netw 12:691-707 (Pubitemid 44546786)
    • (2006) Wireless Networks , vol.12 , Issue.6 , pp. 691-707
    • Efthymiou, C.1    Nikoletseas, S.2    Rolim, J.3
  • 17
    • 4143145711 scopus 로고    scopus 로고
    • Design guidelines for wireless sensor networks: Communication, clustering and aggregation
    • Mhatre V, Rosenberg C (2004) Design guidelines for wireless sensor networks: communication, clustering and aggregation. Ad Hoc Networks 2:45-63
    • (2004) Ad Hoc Networks , vol.2 , pp. 45-63
    • Mhatre, V.1    Rosenberg, C.2
  • 18
    • 0036793924 scopus 로고    scopus 로고
    • Denial of service in sensor networks
    • DOI 10.1109/MC.2002.1039518
    • Wood A, Stankovic J (2002) Denial of service in sensor networks. IEEE Comput 35(10):54-62 (Pubitemid 35186161)
    • (2002) Computer , vol.35 , Issue.10 , pp. 54-62
    • Wood, A.D.1    Stankovic, J.A.2
  • 20
    • 0003597249 scopus 로고    scopus 로고
    • Wormhole detection in wireless ad hoc networks
    • Rice University Tech. Rep. TR01-384
    • Hu Y, Perrig A, Johnson U (2002) Wormhole detection in wireless ad hoc networks. Depmenent of Computer Science, Rice University Tech. Rep. TR01-384
    • (2002) Depmenent of Computer Science
    • Hu, Y.1    Perrig, A.2    Johnson, U.3
  • 22
    • 0346336040 scopus 로고    scopus 로고
    • Footprinting for intrusion detection and threat assessment
    • Blyth A (1999) Footprinting for intrusion detection and threat assessment. Inf Secur Tech Rep 4(3):43-53 (Pubitemid 129602604)
    • (1999) Information Security Technical Report , vol.4 , Issue.3 , pp. 43-53
    • Blyth, A.1
  • 27
    • 0038487088 scopus 로고    scopus 로고
    • Random key predistribution schemes for sensor networks
    • Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. IEEE Comput Soc 197-213
    • (2003) IEEE Comput Soc , pp. 197-213
    • Chan, H.1    Perrig, A.2    Song, D.3
  • 28
    • 3042822764 scopus 로고    scopus 로고
    • Establishing pairwise keys in distributed sensor networks
    • Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
    • LiuD, Ning P (2003) Establishing pairwise keys in distributed sensor networks. In: Proc. of the 10th ACM conf. on computer and communications security. ACM Press, New York, pp 52-61 (Pubitemid 40673788)
    • (2003) Proceedings of the ACM Conference on Computer and Communications Security , pp. 52-61
    • Liu, D.1    Ning, P.2
  • 30
    • 33144476837 scopus 로고    scopus 로고
    • Location-based compromise-tolerant security mechanisms for wireless sensor networks
    • DOI 10.1109/JSAC.2005.861382
    • Zhang Y, Liu W, Lou W, Fang Y (2006) Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE J Sel Areas Commun 24(2):247-260 (Pubitemid 43269747)
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 247-260
    • Zhang, Y.1    Liu, W.2    Lou, W.3    Fang, Y.4
  • 31
    • 2942656255 scopus 로고    scopus 로고
    • Secure routing in wireless sensor networks: Attacks and countermeasures
    • DOI 10.1016/S1570-8705(03)00008-8
    • Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks 1(2-3):293-315 (Pubitemid 40421415)
    • (2003) Ad Hoc Networks , vol.1 , Issue.2-3 , pp. 293-315
    • Karlof, C.1    Wagner, D.2
  • 33
    • 67749116290 scopus 로고    scopus 로고
    • An ant colony optimization approach for reputation and qualityof- service-based security in wireless sensor networks
    • Dhurandher K, Misra S, Obaidat M, Gupta N (2009) An ant colony optimization approach for reputation and qualityof- service-based security in wireless sensor networks. Secur Commun Netw 2(2):215-224
    • (2009) Secur Commun Netw , vol.2 , Issue.2 , pp. 215-224
    • Dhurandher, K.1    Misra, S.2    Obaidat, M.3    Gupta, N.4
  • 34
    • 17144429277 scopus 로고    scopus 로고
    • Statistical en-route filtering of injected false data in sensor networks
    • DOI 10.1109/JSAC.2005.843561
    • Ye F, Luo H, Lu S, Zhang L (2005) Statistical en-route filtering of injected false data in sensor networks. IEEE J Sel Areas Commun 23(4):839-850 (Pubitemid 40519638)
    • (2005) IEEE Journal on Selected Areas in Communications , vol.23 , Issue.4 , pp. 839-850
    • Ye, F.1    Luo, H.2    Lu, S.3    Zhang, L.4
  • 35
    • 37549009866 scopus 로고    scopus 로고
    • Distributed algorithms for secure multipath routing in attack-resistant networks
    • Lee PC, Misra V, Rubenstein D (2007) Distributed algorithms for secure multipath routing in attack-resistant networks. IEEE/ACM Trans Netw 15(6):1490-1501
    • (2007) IEEE/ACM Trans Netw , vol.15 , Issue.6 , pp. 1490-1501
    • Lee, P.C.1    Misra, V.2    Rubenstein, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.