메뉴 건너뛰기




Volumn 61, Issue 1, 2016, Pages 123-140

A trust aware routing protocol for energy constrained wireless sensor network

Author keywords

Energy efficiency; Link failure; Node misbehavior; Trust

Indexed keywords

COAL BREAKAGE; ENERGY EFFICIENCY; ENERGY UTILIZATION; POWER MANAGEMENT; ROUTING PROTOCOLS; SENSOR NODES; WIRELESS SENSOR NETWORKS;

EID: 84953355723     PISSN: 10184864     EISSN: 15729451     Source Type: Journal    
DOI: 10.1007/s11235-015-0068-8     Document Type: Article
Times cited : (50)

References (39)
  • 1
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Hu, Y.-C., Johnson, D. B., & Perrig, A. (2003). SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1), 175–192. doi:10.1016/S1570-8705(03)00019-2.
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 2
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Hu, Y.-C., Perrig, A., & Johnson, D. B. (2005). Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1–2), 21–38. doi:10.1007/s11276-004-4744-y.
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 3
    • 84887125774 scopus 로고    scopus 로고
    • SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks
    • Lai, C., Li, H., Lu, R., & Shen, X. S. (2013). SE-AKA: A secure and efficient group authentication and key agreement protocol for LTE networks. Computer Networks, 57(17), 3492–3510. doi:10.1002/ett.2635.
    • (2013) Computer Networks , vol.57 , Issue.17 , pp. 3492-3510
    • Lai, C.1    Li, H.2    Lu, R.3    Shen, X.S.4
  • 5
    • 62949130774 scopus 로고    scopus 로고
    • Two-factor user Authentication in Wireless Sensor Networks
    • Das, M. L. (2009). Two-factor user Authentication in Wireless Sensor Networks. IEEE Transactions on Wireless Communications, 8(3), 1086–1090.
    • (2009) IEEE Transactions on Wireless Communications , vol.8 , Issue.3 , pp. 1086-1090
    • Das, M.L.1
  • 7
    • 39149127588 scopus 로고    scopus 로고
    • Cryptographic versus trust-based methods for MANET routing security
    • Cordasco, J., & Wetzel, S. (2008). Cryptographic versus trust-based methods for MANET routing security. Electronic Notes in Theoretical Computer Science, 197(2), 131–140. doi:10.1016/j.entcs.2007.12.022.
    • (2008) Electronic Notes in Theoretical Computer Science , vol.197 , Issue.2 , pp. 131-140
    • Cordasco, J.1    Wetzel, S.2
  • 8
    • 84861334371 scopus 로고    scopus 로고
    • Trust computations and trust dynamics in mobile adhoc networks: A survey
    • Govindan, K., & Mohapatra, P. (2012). Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Communications Surveys & Tutorials, 14(2), 279–298. doi:10.1109/SURV.2011.042711.00083.
    • (2012) IEEE Communications Surveys & Tutorials , vol.14 , Issue.2 , pp. 279-298
    • Govindan, K.1    Mohapatra, P.2
  • 10
    • 84858038684 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • Yu, Y., Li, K., Zhou, W., & Li, P. (2012). Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications, 35(3), 867–880. doi:10.1016/j.jnca.2011.03.005.
    • (2012) Journal of Network and Computer Applications , vol.35 , Issue.3 , pp. 867-880
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 13
    • 62249218320 scopus 로고    scopus 로고
    • Quick local repair scheme using adaptive promiscuous mode in mobile ad hoc networks
    • Youn, J. (2006). Quick local repair scheme using adaptive promiscuous mode in mobile ad hoc networks. Journal of Networks, 1(1), 1–11.
    • (2006) Journal of Networks , vol.1 , Issue.1 , pp. 1-11
    • Youn, J.1
  • 16
    • 84904665056 scopus 로고    scopus 로고
    • A light-weight trust-based QoS routing algorithm for ad hoc networks
    • Wang, B., Chen, X., & Chang, W. (2014). A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive and Mobile Computing, 13, 164–180. doi:10.1016/j.pmcj.2013.06.004.
    • (2014) Pervasive and Mobile Computing , vol.13 , pp. 164-180
    • Wang, B.1    Chen, X.2    Chang, W.3
  • 17
    • 84885310593 scopus 로고    scopus 로고
    • TC-BAC: A trust and centrality degree based access control model in wireless sensor networks
    • Duan, J., Gao, D., Foh, C. H., & Zhang, H. (2013). TC-BAC: A trust and centrality degree based access control model in wireless sensor networks. Ad Hoc Networks, 11(8), 2675–2692. doi:10.1016/j.adhoc.2013.05.005.
    • (2013) Ad Hoc Networks , vol.11 , Issue.8 , pp. 2675-2692
    • Duan, J.1    Gao, D.2    Foh, C.H.3    Zhang, H.4
  • 18
    • 84893499151 scopus 로고    scopus 로고
    • Light-weight trust-based on-demand multipath routing protocol for mobile ad hoc networks. In 12th IEEE International Conference on Trust
    • Qu, C., Ju, L., Jia, Z., Xu, H., & Zheng, L. (2013). Light-weight trust-based on-demand multipath routing protocol for mobile ad hoc networks. In 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (pp. 42–49). doi:10.1109/TrustCom.2013.9.
    • (2013) Security and Privacy in Computing and Communications , pp. 42-49
    • Qu, C.1    Ju, L.2    Jia, Z.3    Xu, H.4    Zheng, L.5
  • 20
    • 84866593866 scopus 로고    scopus 로고
    • A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks
    • Sun, Y., Luo, H., & Das, S. K. (2012). A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks. IEEE Transactions on Dependable and Secure Computing, 9(6), 785–797.
    • (2012) IEEE Transactions on Dependable and Secure Computing , vol.9 , Issue.6 , pp. 785-797
    • Sun, Y.1    Luo, H.2    Das, S.K.3
  • 21
    • 84864767821 scopus 로고    scopus 로고
    • Dealing with dishonest recommendation: The trials in reputation management court
    • Chen, S., Zhang, Y., Liu, Q., & Feng, J. (2012). Dealing with dishonest recommendation: The trials in reputation management court. Ad Hoc Networks, 10(8), 1603–1618. doi:10.1016/j.adhoc.2011.07.014.
    • (2012) Ad Hoc Networks , vol.10 , Issue.8 , pp. 1603-1618
    • Chen, S.1    Zhang, Y.2    Liu, Q.3    Feng, J.4
  • 22
    • 78651566862 scopus 로고    scopus 로고
    • Trust based outing for misbehavior detection in ad hoc networks
    • Gong, W., You, Z., Chen, D., Zhao, X., Gu, M., & Lam, K.-Y. (2010). Trust based outing for misbehavior detection in ad hoc networks. Journal of Networks, 5(5), 551–558. doi:10.4304/jnw.5.5.551-558.
    • (2010) Journal of Networks , vol.5 , Issue.5 , pp. 551-558
    • Gong, W.1    You, Z.2    Chen, D.3    Zhao, X.4    Gu, M.5    Lam, K.-Y.6
  • 23
    • 84857844113 scopus 로고    scopus 로고
    • A survey on trust management for mobile ad hoc networks
    • Cho, J., Swami, A., & Chen, I. (2011). A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys & Tutorials, 13(4), 562–583.
    • (2011) IEEE Communications Surveys & Tutorials , vol.13 , Issue.4 , pp. 562-583
    • Cho, J.1    Swami, A.2    Chen, I.3
  • 24
    • 0036980294 scopus 로고    scopus 로고
    • Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security (pp. 1–10). New York: ACM
    • Zapata, M. G., & Asokan, N. (2002). Securing ad hoc routing protocols. In Proceedings of the 1st ACM workshop on Wireless security (pp. 1–10). New York: ACM.
  • 25
    • 0035789243 scopus 로고    scopus 로고
    • Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware routing protocol for wireless ad-hoc networks. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (pp. 299–302). New York: ACM
    • Yi, S., Naldurg, P., & Kravets, R. (2001). Security-aware routing protocol for wireless ad-hoc networks. In Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (pp. 299–302). New York: ACM.
  • 27
    • 84886593344 scopus 로고    scopus 로고
    • Trust-Based Routing Mechanism in MANET: Design and Implementation
    • Eissa, T., Abdul Razak, S., Khokhar, R. H., & Samian, N. (2013). Trust-Based Routing Mechanism in MANET: Design and Implementation. Mobile Networks and Applications, 18(5), 666–677. doi:10.1007/s11036-011-0328-0.
    • (2013) Mobile Networks and Applications , vol.18 , Issue.5 , pp. 666-677
    • Eissa, T.1    Abdul Razak, S.2    Khokhar, R.H.3    Samian, N.4
  • 28
    • 84856274467 scopus 로고    scopus 로고
    • Design and implementation of TARF?: A trust-aware routing framework for WSNs
    • Zhan, G., Shi, W., & Deng, J. (2012). Design and implementation of TARF?: A trust-aware routing framework for WSNs. IEEE Transactions on Dependable and Secure Computing, 9(2), 184–197.
    • (2012) IEEE Transactions on Dependable and Secure Computing , vol.9 , Issue.2 , pp. 184-197
    • Zhan, G.1    Shi, W.2    Deng, J.3
  • 30
    • 80053318843 scopus 로고    scopus 로고
    • A reliable routing scheme for post-disaster ad hoc communication networks
    • Channa, M. I., & Ahmed, K. M. (2011). A reliable routing scheme for post-disaster ad hoc communication networks. Journal of Communications, 6(7), 549–557. doi:10.4304/jcm.6.7.549-557.
    • (2011) Journal of Communications , vol.6 , Issue.7 , pp. 549-557
    • Channa, M.I.1    Ahmed, K.M.2
  • 31
    • 84863586452 scopus 로고    scopus 로고
    • Light-weight trust-based routing protocol for mobile ad hoc networks
    • Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security, 6(2), 77–83. doi:10.1049/iet-ifs.2010.0160.
    • (2012) IET Information Security , vol.6 , Issue.2 , pp. 77-83
    • Marchang, N.1    Datta, R.2
  • 34
    • 0034541756 scopus 로고    scopus 로고
    • Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255–265). New York: ACM
    • Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (pp. 255–265). New York: ACM. doi:10.1145/345910.345955.
  • 35
    • 84953370856 scopus 로고    scopus 로고
    • Josang, A., & Ismail, R. (2002). The beta reputation system. In 15th Bled Electronic Commerce Conference (pp. 324–337). Bled Slovenia
    • Josang, A., & Ismail, R. (2002). The beta reputation system. In 15th Bled Electronic Commerce Conference (pp. 324–337). Bled Slovenia.
  • 37
    • 84866262114 scopus 로고    scopus 로고
    • Rahman, A., & Anwar, S. (2012). Enhanced QLRS-APM?: A New proposal ad hoc networks. In Recent Advances in Computer Science and Information Engineering (pp. 91–99). Springer
    • Rahman, A., & Anwar, S. (2012). Enhanced QLRS-APM?: A New proposal ad hoc networks. In Recent Advances in Computer Science and Information Engineering (pp. 91–99). Springer.
  • 38
    • 33947517509 scopus 로고    scopus 로고
    • Hop-by-hop congestion control over a wireless multi-hop network
    • Yi, Y., & Shakkottai, S. (2007). Hop-by-hop congestion control over a wireless multi-hop network. IEEE/ACM Transactions on Networking, 15(1), 133–144.
    • (2007) IEEE/ACM Transactions on Networking , vol.15 , Issue.1 , pp. 133-144
    • Yi, Y.1    Shakkottai, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.