메뉴 건너뛰기




Volumn 1, Issue 1, 2014, Pages 58-69

An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications

Author keywords

Energy awareness; game theory; Internet of Things (IoT); security; trust evaluation; wireless sensor network (WSN)

Indexed keywords

GAME THEORY; INTERNET; INTERNET OF THINGS; MOBILE SECURITY; NETWORK SECURITY; POWER MANAGEMENT; POWER MANAGEMENT (TELECOMMUNICATION); SENSOR NODES;

EID: 84923224400     PISSN: None     EISSN: 23274662     Source Type: Journal    
DOI: 10.1109/JIOT.2014.2314132     Document Type: Article
Times cited : (188)

References (44)
  • 1
    • 80052854156 scopus 로고    scopus 로고
    • Securing the internet of things
    • R. Roman, P. Najera, and J. Lopez, "Securing the Internet of Things," Computer, vol. 44, no. 9, pp. 51-58, 2011.
    • (2011) Computer , vol.44 , Issue.9 , pp. 51-58
    • Roman, R.1    Najera, P.2    Lopez, J.3
  • 2
    • 84870682499 scopus 로고    scopus 로고
    • A new data aggregation scheme via adaptive compression for wireless sensor networks
    • P. Kasirajan, C. Larsen, and S. Jagannathan, "A new data aggregation scheme via adaptive compression for wireless sensor networks," ACM Trans. Sensor Netw., vol. 9, no. 1, pp. 1-5, 2012.
    • (2012) ACM Trans. Sensor Netw. , vol.9 , Issue.1 , pp. 1-5
    • Kasirajan, P.1    Larsen, C.2    Jagannathan, S.3
  • 3
    • 84866925146 scopus 로고    scopus 로고
    • Localized geographic routing to a mobile sink with guaranteed delivery in sensor networks
    • Oct
    • X. Li, J. Yang, A. Nayak, and I. Stojmenovic, "Localized geographic routing to a mobile sink with guaranteed delivery in sensor networks," IEEE J. Sel. Areas Commun., vol. 30, no. 9, pp. 1719-1729, Oct. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.9 , pp. 1719-1729
    • Li, X.1    Yang, J.2    Nayak, A.3    Stojmenovic, I.4
  • 4
    • 81555203548 scopus 로고    scopus 로고
    • Distributed iterative quantization for interference characterization in wireless networks
    • V. Kapnadak, M. Senel, and E. Coyle, "Distributed iterative quantization for interference characterization in wireless networks," Digit. Signal Process., vol. 22, no. 1, pp. 96-105, 2012.
    • (2012) Digit. Signal Process. , vol.22 , Issue.1 , pp. 96-105
    • Kapnadak, V.1    Senel, M.2    Coyle, E.3
  • 5
    • 77956377841 scopus 로고    scopus 로고
    • Designing and deploying a buildingwide cognitive radio network testbed
    • Sep
    • T. Newman, S. Hasan, and D. DePoy, "Designing and deploying a buildingwide cognitive radio network testbed," IEEE Commun. Mag., vol. 48, no. 9, pp. 106-112, Sep. 2010.
    • (2010) IEEE Commun. Mag. , vol.48 , Issue.9 , pp. 106-112
    • Newman, T.1    Hasan, S.2    Depoy, D.3
  • 6
    • 84863078189 scopus 로고    scopus 로고
    • Secure cooperative data storage and query processing in unattended tiered sensor networks
    • Feb
    • R. Zhang, J. Shi, Y. Zhang, and J. Sun, "Secure cooperative data storage and query processing in unattended tiered sensor networks," IEEE J. Sel. Areas Commun., vol. 30, no. 2, pp. 433-441, Feb. 2012.
    • (2012) IEEE J. Sel. Areas Commun. , vol.30 , Issue.2 , pp. 433-441
    • Zhang, R.1    Shi, J.2    Zhang, Y.3    Sun, J.4
  • 7
    • 80052159598 scopus 로고    scopus 로고
    • Exploiting trust relations for nash equilibrium efficiency in ad hoc networks
    • S. Zheng, T. Jiang, and J. Baras, "Exploiting trust relations for Nash equilibrium efficiency in ad hoc networks," in Proc. IEEE Int. Conf. Commun. (ICC), 2011, pp. 1-5.
    • (2011) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 1-5
    • Zheng, S.1    Jiang, T.2    Baras, J.3
  • 8
    • 77952925515 scopus 로고    scopus 로고
    • Key predistribution approach in wireless sensor networks using lu matrix
    • Aug
    • H. Dai and H. Xu, "Key predistribution approach in wireless sensor networks using lu matrix," IEEE Sensors J., vol. 10, no. 8, pp. 1399-1409, Aug. 2010.
    • (2010) IEEE Sensors J. , vol.10 , Issue.8 , pp. 1399-1409
    • Dai, H.1    Xu, H.2
  • 9
    • 70450164574 scopus 로고    scopus 로고
    • A survey of secure mobile ad hoc routing protocols
    • Oct.
    • L. Abusalah, A. Khokhar, and M. Guizani, "A survey of secure mobile ad hoc routing protocols," IEEE Commun. Surveys Tuts., vol. 10, no. 4, pp. 78-93, Oct. 2008.
    • (2008) IEEE Commun. Surveys Tuts. , vol.10 , Issue.4 , pp. 78-93
    • Abusalah, L.1    Khokhar, A.2    Guizani, M.3
  • 10
    • 77951127884 scopus 로고    scopus 로고
    • A collusion-resistant routing scheme for noncooperative wireless ad hoc networks
    • Apr
    • S. Zhong and F. Wu, "A collusion-resistant routing scheme for noncooperative wireless ad hoc networks," IEEE/ACM Trans. Netw., vol. 18, no. 2, pp. 582-595, Apr. 2010.
    • (2010) IEEE/ACM Trans. Netw. , vol.18 , Issue.2 , pp. 582-595
    • Zhong, S.1    Wu, F.2
  • 11
    • 39149127588 scopus 로고    scopus 로고
    • Cryptographic versus trust-based methods for manet routing security
    • J. Cordasco and S. Wetzel, "Cryptographic versus trust-based methods for MANET routing security," Electron. Notes Theor. Comput. Sci., vol. 197, no. 2, pp. 131-140, 2008.
    • (2008) Electron. Notes Theor. Comput. Sci. , vol.197 , Issue.2 , pp. 131-140
    • Cordasco, J.1    Wetzel, S.2
  • 12
    • 70349682512 scopus 로고    scopus 로고
    • Fdac: Toward fine-grained distributed data access control in wireless sensor networks
    • S. Yu, K. Ren, and W. Lou, "FDAC: Toward fine-grained distributed data access control in wireless sensor networks," in Proc. IEEE INFOCOM, 2009, pp. 963-971.
    • (2009) Proc. IEEE INFOCOM , pp. 963-971
    • Yu, S.1    Ren, K.2    Lou, W.3
  • 13
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user authentication in wireless sensor networks
    • Mar.
    • M. Das, "Two-factor user authentication in wireless sensor networks," IEEE Trans. Wireless Commun., vol. 8, no. 3, pp. 1086-1090, Mar. 2009.
    • (2009) IEEE Trans. Wireless Commun. , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.1
  • 14
    • 41849094781 scopus 로고    scopus 로고
    • Mitigating dos attacks against broadcast authentication in wireless sensor networks
    • P. Ning, A. Liu, and W. Du, "Mitigating DoS attacks against broadcast authentication in wireless sensor networks,"ACMTrans. Sensor Netw., vol. 4, no. 1, pp. 1-35, 2008.
    • (2008) ACMTrans. Sensor Netw. , vol.4 , Issue.1 , pp. 1-35
    • Ning, P.1    Liu, A.2    Du, W.3
  • 15
    • 33144465377 scopus 로고    scopus 로고
    • On trust models and trust evaluation metrics for ad hoc networks
    • Feb.
    • G. Theodorakopoulos and J. Baras, "On trust models and trust evaluation metrics for ad hoc networks," IEEE J. Sel. Areas Commun., vol. 24, no. 2, pp. 318-328, Feb. 2006.
    • (2006) IEEE J. Sel. Areas Commun. , vol.24 , Issue.2 , pp. 318-328
    • Theodorakopoulos, G.1    Baras, J.2
  • 16
    • 77953306999 scopus 로고    scopus 로고
    • A formal study of trust-based routing in wireless ad hoc networks
    • C. Zhang, X. Zhu, Y. Song, and Y. Fang, "A formal study of trust-based routing in wireless ad hoc networks," in Proc. IEEE INFOCOM, 2010, pp. 1-9.
    • (2010) Proc. IEEE INFOCOM , pp. 1-9
    • Zhang, C.1    Zhu, X.2    Song, Y.3    Fang, Y.4
  • 17
    • 84883463898 scopus 로고    scopus 로고
    • Trust prediction and trust-based source routing in mobile ad hoc networks
    • Sep
    • H. Xia, Z. Jia, X. Li, L. Ju, and E. Sha, "Trust prediction and trust-based source routing in mobile ad hoc networks," Ad Hoc Netw., vol. 11, no. 7, pp. 2096-2114, Sep. 2013.
    • (2013) Ad Hoc Netw. , vol.11 , Issue.7 , pp. 2096-2114
    • Xia, H.1    Jia, Z.2    Li, X.3    Ju, L.4    Sha, E.5
  • 18
    • 84877811867 scopus 로고    scopus 로고
    • Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks
    • Y. Ren and A. Boukerche, "Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks," in Proc. IEEE Int. Conf. Commun. (ICC), 2009, pp. 5535-5539.
    • (2009) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 5535-5539
    • Ren, Y.1    Boukerche, A.2
  • 19
    • 80052158517 scopus 로고    scopus 로고
    • Trust-based and energy-Aware incentive routing protocol for multi-hop wireless networks
    • M. Mahmoud and X. Shen, "Trust-based and energy-Aware incentive routing protocol for multi-hop wireless networks," in Proc. IEEE Int. Conf. Commun. (ICC), 2011, pp. 1-5.
    • Proc. IEEE Int. Conf. Commun. (ICC) , vol.2011 , pp. 1-5
    • Mahmoud, M.1    Shen, X.2
  • 20
    • 51249121100 scopus 로고    scopus 로고
    • Modeling and managing the trust for wireless and mobile ad hoc networks
    • Y. Ren and A. Boukerche, "Modeling and managing the trust for wireless and mobile ad hoc networks," in Proc. IEEE Int. Conf. Commun. (ICC), 2008, pp. 2129-2133.
    • (2008) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 2129-2133
    • Ren, Y.1    Boukerche, A.2
  • 21
    • 79952097418 scopus 로고    scopus 로고
    • A trust evaluation algorithm for wireless sensor networks based on node behaviors and d-s evidence theory
    • R. Feng, X. Xu, X. Zhou, and J. Wan, "A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory," Sensors, vol. 11, no. 2, pp. 1345-1360, 2011.
    • (2011) Sensors , vol.11 , Issue.2 , pp. 1345-1360
    • Feng, R.1    Xu, X.2    Zhou, X.3    Wan, J.4
  • 23
    • 77950866308 scopus 로고    scopus 로고
    • Trust management systems for wireless sensor networks: Best practices
    • J. Lopez, R. Roman, I. Agudo, and C. Fernandez-Gago, "Trust management systems for wireless sensor networks: Best practices," Comput. Commun., vol. 33, no. 9, pp. 1086-1093, 2010.
    • (2010) Comput. Commun. , vol.33 , Issue.9 , pp. 1086-1093
    • Lopez, J.1    Roman, R.2    Agudo, I.3    Fernandez-Gago, C.4
  • 24
    • 0345851235 scopus 로고    scopus 로고
    • Wireless integrated network sensors
    • G. Pottie and W. Kaiser, "Wireless integrated network sensors," Commun. ACM, vol. 43, no. 5, pp. 51-58, 2000.
    • (2000) Commun. ACM , vol.43 , Issue.5 , pp. 51-58
    • Pottie, G.1    Kaiser, W.2
  • 28
    • 77952125612 scopus 로고    scopus 로고
    • Reputation-based security protocol for manets in highly mobile disconnection-prone environments
    • S. Zakhary and M. Radenkovic, "Reputation-based security protocol for manets in highly mobile disconnection-prone environments," in Proc. 7th Int. Conf. Wireless On-demand Netw. Syst. Serv., 2010, pp. 161-167.
    • (2010) Proc. 7th Int. Conf. Wireless On-demand Netw. Syst. Serv. , pp. 161-167
    • Zakhary, S.1    Radenkovic, M.2
  • 29
    • 47949102142 scopus 로고    scopus 로고
    • Trust-based evolutionary game model assisting aodv routing against selfishness
    • K. Komathy and P. Narayanasamy, "Trust-based evolutionary game model assisting AODV routing against selfishness," J. Netw. Comput. Appl., vol. 31, no. 4, pp. 446-471, 2008.
    • (2008) J. Netw. Comput. Appl. , vol.31 , Issue.4 , pp. 446-471
    • Komathy, K.1    Narayanasamy, P.2
  • 30
    • 56449123247 scopus 로고    scopus 로고
    • Game theoretic approach in routing protocol for wireless ad hoc networks
    • M. Naserian and K. Tepe, "Game theoretic approach in routing protocol for wireless ad hoc networks," Ad Hoc Netw., vol. 7, no. 3, pp. 569-578, 2009.
    • (2009) Ad Hoc Netw. , vol.7 , Issue.3 , pp. 569-578
    • Naserian, M.1    Tepe, K.2
  • 31
    • 80052141648 scopus 로고    scopus 로고
    • Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy
    • C. Kamhoua, N. Pissinou, and K. Makki, "Game theoretic modeling and evolution of trust in autonomous multi-hop networks: Application to network security and privacy," in Proc. IEEE Int. Conf. Commun. (ICC), 2011, pp. 1-6.
    • (2011) Proc. IEEE Int. Conf. Commun. (ICC) , pp. 1-6
    • Kamhoua, C.1    Pissinou, N.2    Makki, K.3
  • 32
    • 13244286379 scopus 로고    scopus 로고
    • The ns manual
    • Univ. Southern California, Los Angeles, CA, USA
    • K. Fall and K. Varadhan, "The NS Manual," The VINT Project, Inform. Sci. Inst., Univ. Southern California, Los Angeles, CA, USA, vol. 1, 2002.
    • (2002) The VINT Project, Inform. Sci. Inst , vol.1
    • Fall, K.1    Varadhan, K.2
  • 33
    • 67349173961 scopus 로고    scopus 로고
    • A trust degree based access control in grid environments
    • J. Luo, X. Ni, and J. Yong, "A trust degree based access control in grid environments," Inf. Sci., vol. 179, no. 15, pp. 2618-2628, 2009.
    • (2009) Inf. Sci. , vol.179 , Issue.15 , pp. 2618-2628
    • Luo, J.1    Ni, X.2    Yong, J.3
  • 34
    • 84858038684 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • Y. Yu, K. Li, W. Zhou, and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures," J. Netw. Comput. Appl., vol. 35, no. 3, pp. 867-880, 2012.
    • (2012) J. Netw. Comput. Appl. , vol.35 , Issue.3 , pp. 867-880
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 35
    • 84885310593 scopus 로고    scopus 로고
    • Tc-bac: A trust and centrality degree based access control model in wireless sensor networks
    • Nov
    • J. Duan, D. Gao, C. H. Foh, and H. Zhang, "TC-BAC:A trust and centrality degree based access control model in wireless sensor networks," Ad Hoc Netw., vol. 11, no 8, pp. 2675-2692, Nov. 2013.
    • (2013) Ad Hoc Netw. , vol.11 , Issue.8 , pp. 2675-2692
    • Duan, J.1    Gao, D.2    Foh, C.H.3    Zhang, H.4
  • 36
    • 33646410469 scopus 로고    scopus 로고
    • Performance comparison of trust-based reactive routing protocols
    • Jun.
    • A. A. Pirzada, C. Mcdonald, and A. Datta, "Performance comparison of trust-based reactive routing protocols," IEEE Trans. Mobile Comput., vol. 5, no. 6, pp. 695-710, Jun. 2006.
    • (2006) IEEE Trans. Mobile Comput. , vol.5 , Issue.6 , pp. 695-710
    • Pirzada, A.A.1    McDonald, C.2    Datta, A.3
  • 37
    • 0001980141 scopus 로고
    • The evolution of strategies in the iterated prisoner's dilemma
    • R. Axelrod, "The evolution of strategies in the iterated prisoner's dilemma," in Proc. Genetic Algorithms Simul. Anneal., 1987, pp. 32-41.
    • (1987) Proc. Genetic Algorithms Simul. Anneal. , pp. 32-41
    • Axelrod, R.1
  • 39
    • 28844437381 scopus 로고    scopus 로고
    • Phase diagrams for an evolutionary prisoner's dilemma game on two-dimensional lattices
    • Oct.
    • G. Szabó, J. Vukov, and A. Szolnoki, "Phase diagrams for an evolutionary prisoner's dilemma game on two-dimensional lattices," IEEE Trans. Mobile Comput., vol. 72, no. 4, p. 047107, Oct. 2005.
    • (2005) IEEE Trans. Mobile Comput. , vol.72 , Issue.4 , pp. 047107
    • Szabó, G.1    Vukov, J.2    Szolnoki, A.3
  • 40
    • 79952946238 scopus 로고    scopus 로고
    • Evolution of strategies with different representation schemes in a spatial iterated prisoner's dilemma game
    • Mar
    • H. Ishibuchi, H. Ohyanagi, and Y. Nojima, "Evolution of strategies with different representation schemes in a spatial iterated prisoner's dilemma Game," IEEE Trans. Comput. Intell. AI Games, vol. 3, no. 1, pp. 67-82, Mar. 2011.
    • (2011) IEEE Trans. Comput. Intell. AI Games , vol.3 , Issue.1 , pp. 67-82
    • Ishibuchi, H.1    Ohyanagi, H.2    Nojima, Y.3
  • 42
    • 56749140937 scopus 로고    scopus 로고
    • Defense of trust management vulnerabilities in distributed networks
    • Feb.
    • Y. Sun, Z. Han, and K. J. R. Liu, "Defense of trust management vulnerabilities in distributed networks," IEEE Commun. Mag., vol. 46, no. 2, pp. 112-119, Feb. 2008.
    • (2008) IEEE Commun. Mag. , vol.46 , Issue.2 , pp. 112-119
    • Sun, Y.1    Han, Z.2    Liu, K.J.R.3
  • 44
    • 84874709128 scopus 로고    scopus 로고
    • Netfence: Preventing internet denial of service from inside out
    • X. Liu, X. Yang, and Y. Xia, "NetFence: Preventing internet denial of service from inside out," ACM SIGCOMM Comput. Commun. Rev., vol. 40, no. 4, pp. 255-266, 2010.
    • (2010) ACM SIGCOMM Comput. Commun. Rev. , vol.40 , Issue.4 , pp. 255-266
    • Liu, X.1    Yang, X.2    Xia, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.