메뉴 건너뛰기




Volumn 11, Issue 9, 2016, Pages 2013-2027

ActiveTrust: Secure and Trustable Routing in Wireless Sensor Networks

Author keywords

black hole attack; network lifetime; security; trust; wireless sensor networks

Indexed keywords

ENERGY EFFICIENCY; GRAVITATION; STARS; WIRELESS SENSOR NETWORKS;

EID: 84978943536     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2016.2570740     Document Type: Article
Times cited : (337)

References (37)
  • 1
    • 84902949347 scopus 로고    scopus 로고
    • Mobile target detection in wireless sensor networks with adjustable sensing frequency
    • to be published
    • Y. Hu, M. Dong, K. Ota, A. Liu, and M. Guo, "Mobile target detection in wireless sensor networks with adjustable sensing frequency, " IEEE Syst. J., to be published, doi: 10.1109/JSYST.2014.2308391.
    • IEEE Syst. J
    • Hu, Y.1    Dong, M.2    Ota, K.3    Liu, A.4    Guo, M.5
  • 2
    • 84961727422 scopus 로고    scopus 로고
    • Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks
    • Jan
    • M. Dong, K. Ota, A. Liu, and M. Guo, "Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks, " IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 1, pp. 225-236, Jan. 2016.
    • (2016) IEEE Trans. Parallel Distrib. Syst , vol.27 , Issue.1 , pp. 225-236
    • Dong, M.1    Ota, K.2    Liu, A.3    Guo, M.4
  • 3
    • 84883113038 scopus 로고    scopus 로고
    • Energy provisioning in wireless rechargeable sensor networks
    • Oct
    • S. He, J. Chen, F. Jiang, D. K. Y. Yau, G. Xing, and Y. Sun, "Energy provisioning in wireless rechargeable sensor networks, " IEEE Trans. Mobile Comput., vol. 12, no. 10, pp. 1931-1942, Oct. 2013.
    • (2013) IEEE Trans. Mobile Comput , vol.12 , Issue.10 , pp. 1931-1942
    • He, S.1    Chen, J.2    Jiang, F.3    Yau, D.K.Y.4    Xing, G.5    Sun, Y.6
  • 4
    • 84963804113 scopus 로고    scopus 로고
    • Service pricing decision in cyber-physical systems: Insights from game theory
    • Mar./Apr
    • X. Liu, M. Dong, K. Ota, P. Hung, and A. Liu, "Service pricing decision in cyber-physical systems: Insights from game theory, " IEEE Trans. Services Comput., vol. 9, no. 2, pp. 186-198, Mar./Apr. 2016.
    • (2016) IEEE Trans. Services Comput , vol.9 , Issue.2 , pp. 186-198
    • Liu, X.1    Dong, M.2    Ota, K.3    Hung, P.4    Liu, A.5
  • 5
    • 84919816091 scopus 로고    scopus 로고
    • An authenticated trust and reputation calculation and management system for cloud and sensor networks integration
    • Jan
    • C. Zhu, H. Nicanfar, V. C. M. Leung, and L. T. Yang, "An authenticated trust and reputation calculation and management system for cloud and sensor networks integration, " IEEE Trans. Inf. Forensics Security, vol. 10, no. 1, pp. 118-131, Jan. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.1 , pp. 118-131
    • Zhu, C.1    Nicanfar, H.2    Leung, V.C.M.3    Yang, L.T.4
  • 6
    • 84949818989 scopus 로고    scopus 로고
    • PHACK: An efficient scheme for selective forwarding attack detection in WSNs
    • A. Liu, M. Dong, K. Ota, and J. Long, "PHACK: An efficient scheme for selective forwarding attack detection in WSNs, " Sensors, vol. 15, no. 12, pp. 30942-30963, 2015.
    • (2015) Sensors , vol.15 , Issue.12 , pp. 30942-30963
    • Liu, A.1    Dong, M.2    Ota, K.3    Long, J.4
  • 7
    • 84874114967 scopus 로고    scopus 로고
    • Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network
    • May
    • A. Liu, X. Jin, G. Cui, and Z. Chen, "Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network, " Inf. Sci., vol. 230, pp. 197-226, May 2013.
    • (2013) Inf. Sci , vol.230 , pp. 197-226
    • Liu, A.1    Jin, X.2    Cui, G.3    Chen, Z.4
  • 8
    • 84963850053 scopus 로고    scopus 로고
    • Energy and memory efficient clone detection in wireless sensor networks
    • May
    • Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. Shen, "Energy and memory efficient clone detection in wireless sensor networks, " IEEE Trans. Mobile Comput., vol. 15, no. 5, pp. 1130-1143, May 2016.
    • (2016) IEEE Trans. Mobile Comput , vol.15 , Issue.5 , pp. 1130-1143
    • Zheng, Z.1    Liu, A.2    Cai, L.X.3    Chen, Z.4    Shen, X.5
  • 9
    • 77952986444 scopus 로고    scopus 로고
    • Secure data collection in wireless sensor networks using randomized dispersive routes
    • Jul
    • T. Shu, M. Krunz, and S. Liu, "Secure data collection in wireless sensor networks using randomized dispersive routes, " IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941-954, Jul. 2010.
    • (2010) IEEE Trans. Mobile Comput , vol.9 , Issue.7 , pp. 941-954
    • Shu, T.1    Krunz, M.2    Liu, S.3
  • 11
    • 84908240474 scopus 로고    scopus 로고
    • Differential game-based strategies for preventing malware propagation in wireless sensor networks
    • Nov
    • S. Shen, H. Li, R. Han, A. V. Vasilakos, Y. Wang, and Q. Cao, "Differential game-based strategies for preventing malware propagation in wireless sensor networks, " IEEE Trans. Inf. Forensics Security, vol. 9, no. 11, pp. 1962-1973, Nov. 2014.
    • (2014) IEEE Trans. Inf. Forensics Security , vol.9 , Issue.11 , pp. 1962-1973
    • Shen, S.1    Li, H.2    Han, R.3    Vasilakos, A.V.4    Wang, Y.5    Cao, Q.6
  • 12
    • 55249109242 scopus 로고    scopus 로고
    • Load-balancing in MANET shortest-path routing protocols
    • O. Souihli, M. Frikha, and M. B. Hamouda, "Load-balancing in MANET shortest-path routing protocols, " Ad Hoc Netw., vol. 7, no. 2, pp. 431-442, 2009.
    • (2009) Ad Hoc Netw , vol.7 , Issue.2 , pp. 431-442
    • Souihli, O.1    Frikha, M.2    Hamouda, M.B.3
  • 13
    • 84929164299 scopus 로고    scopus 로고
    • An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing
    • Jul
    • J. Long, A. Liu, M. Dong, and Z. Li, "An energy-efficient and sink-location privacy enhanced scheme for WSNs through ring based routing, " J. Parallel Distrib. Comput., vols. 81-82, pp. 47-65, Jul. 2015.
    • (2015) J. Parallel Distrib. Comput , vol.81-82 , pp. 47-65
    • Long, J.1    Liu, A.2    Dong, M.3    Li, Z.4
  • 14
    • 84902184986 scopus 로고    scopus 로고
    • Mobility and intruder prior information improving the barrier coverage of sparse sensor networks
    • Jun
    • S. He, J. Chen, X. Li, X. Shen, and Y. Sun, "Mobility and intruder prior information improving the barrier coverage of sparse sensor networks, " IEEE Trans. Mobile Comput., vol. 13, no. 6, pp. 1268-1282, Jun. 2015.
    • (2015) IEEE Trans. Mobile Comput , vol.13 , Issue.6 , pp. 1268-1282
    • He, S.1    Chen, J.2    Li, X.3    Shen, X.4    Sun, Y.5
  • 15
    • 84921344790 scopus 로고    scopus 로고
    • Effective key management in dynamic wireless sensor networks
    • Feb
    • S. H. Seo, J. Won, S. Sultana, and E. Bertino, "Effective key management in dynamic wireless sensor networks, " IEEE Trans. Inf. Forensics Security, vol. 10, no. 2, pp. 371-383, Feb. 2015.
    • (2015) IEEE Trans. Inf. Forensics Security , vol.10 , Issue.2 , pp. 371-383
    • Seo, S.H.1    Won, J.2    Sultana, S.3    Bertino, E.4
  • 16
    • 84938847954 scopus 로고    scopus 로고
    • An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs
    • Y. Hu and A. Liu, "An efficient heuristic subtraction deployment strategy to guarantee quality of event detection for WSNs, " Comput. J., vol. 58, no. 8, pp. 1747-1762, 2015.
    • (2015) Comput. J , vol.58 , Issue.8 , pp. 1747-1762
    • Hu, Y.1    Liu, A.2
  • 17
    • 0034844688 scopus 로고    scopus 로고
    • Split multipath routing with maximally disjoint paths in ad hoc networks
    • Jun
    • S.-J. Lee and M. Gerla, "Split multipath routing with maximally disjoint paths in ad hoc networks, " in Proc. IEEE ICC, Jun. 2011, pp. 3201-3205.
    • (2011) Proc. IEEE ICC , pp. 3201-3205
    • Lee, S.-J.1    Gerla, M.2
  • 18
    • 84890890871 scopus 로고    scopus 로고
    • Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks
    • to be published
    • Y. Zhang, S. He, and J. Chen, "Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks, " IEEE/ACM Trans. Netw., to be published, doi:10.1109/TNET.2015.2425146.
    • IEEE/ACM Trans. Netw
    • Zhang, Y.1    He, S.2    Chen, J.3
  • 19
    • 77955281759 scopus 로고    scopus 로고
    • A multi-path interleaved hop-by-hop enroute filtering scheme in wireless sensor networks
    • T. P. Nghiem and T. H. Cho, "A multi-path interleaved hop-by-hop enroute filtering scheme in wireless sensor networks, " Comput. Commun., vol. 33, no. 10, pp. 1202-1209, 2010.
    • (2010) Comput. Commun , vol.33 , Issue.10 , pp. 1202-1209
    • Nghiem, T.P.1    Cho, T.H.2
  • 20
    • 84858038684 scopus 로고    scopus 로고
    • Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures
    • Y. Yu, K. Li, W. Zhou, and P. Li, "Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures, " J. Netw. Comput. Appl., vol. 35, no. 3, pp. 867-880, 2012.
    • (2012) J. Netw. Comput. Appl , vol.35 , Issue.3 , pp. 867-880
    • Yu, Y.1    Li, K.2    Zhou, W.3    Li, P.4
  • 21
    • 4544283175 scopus 로고    scopus 로고
    • SORI: A secure and objective reputationbased incentive scheme for ad-hoc networks
    • Mar
    • Q. He, D. Wu, and P. Khosla, "SORI: A secure and objective reputationbased incentive scheme for ad-hoc networks, " in Proc. IEEE Wireless Commun. Netw. Conf., Mar. 2004, pp. 825-830.
    • (2004) Proc. IEEE Wireless Commun. Netw. Conf , pp. 825-830
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 23
  • 24
    • 79956101475 scopus 로고    scopus 로고
    • Building a trusted route in a mobile ad hoc network considering communication reliability and path length
    • J. Wang, Y. Liu, and Y. Jiao, "Building a trusted route in a mobile ad hoc network considering communication reliability and path length, " J. Netw. Comput. Appl., vol. 34, no. 4, pp. 1138-1149, 2011.
    • (2011) J. Netw. Comput. Appl , vol.34 , Issue.4 , pp. 1138-1149
    • Wang, J.1    Liu, Y.2    Jiao, Y.3
  • 25
    • 48649095029 scopus 로고    scopus 로고
    • An efficient countermeasure to the selective forwarding attack in wireless sensor networks
    • Oct./Nov
    • H.-M. Sun, C.-M. Chen, and Y.-C. Hsiao, "An efficient countermeasure to the selective forwarding attack in wireless sensor networks, " in Proc. IEEE TENCON, Oct./Nov. 2007, pp. 1-4.
    • (2007) Proc. IEEE TENCON , pp. 1-4
    • Sun, H.-M.1    Chen, C.-M.2    Hsiao, Y.-C.3
  • 26
    • 0042475197 scopus 로고    scopus 로고
    • A framework for reliable routing in mobile ad hoc networks
    • Mar./Apr
    • Z. Ye, V. Krishnamurthy, and S. K. Tripathi, "A framework for reliable routing in mobile ad hoc networks, " in Proc. IEEE INFOCOM, Mar./Apr. 2003, pp. 270-280.
    • (2003) Proc. IEEE INFOCOM , pp. 270-280
    • Ye, Z.1    Krishnamurthy, V.2    Tripathi, S.K.3
  • 27
    • 33746375987 scopus 로고    scopus 로고
    • H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks
    • Jul
    • W. Lou and Y. Kwon, "H-SPREAD: A hybrid multipath scheme for secure and reliable data collection in wireless sensor networks, " IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1320-1330, Jul. 2006.
    • (2006) IEEE Trans. Veh. Technol , vol.55 , Issue.4 , pp. 1320-1330
    • Lou, W.1    Kwon, Y.2
  • 29
    • 80055037954 scopus 로고    scopus 로고
    • A reliability-oriented transmission service in wireless sensor networks
    • Dec
    • Y. Liu, Y. Zhu, L. Ni, and G. Xue, "A reliability-oriented transmission service in wireless sensor networks, " IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 12, pp. 2100-2107, Dec. 2011.
    • (2011) IEEE Trans. Parallel Distrib. Syst , vol.22 , Issue.12 , pp. 2100-2107
    • Liu, Y.1    Zhu, Y.2    Ni, L.3    Xue, G.4
  • 30
    • 84856274467 scopus 로고    scopus 로고
    • Design and implementation of TARF: A trust-aware routing framework for WSNs
    • Mar./Apr
    • G. Zhan, W. Shi, and J. Deng, "Design and implementation of TARF: A trust-aware routing framework for WSNs, " IEEE Trans. Dependable Secure Comput., vol. 9, no. 2, pp. 184-197, Mar./Apr. 2012.
    • (2012) IEEE Trans. Dependable Secure Comput , vol.9 , Issue.2 , pp. 184-197
    • Zhan, G.1    Shi, W.2    Deng, J.3
  • 31
    • 34548020232 scopus 로고    scopus 로고
    • Adaptive security design with malicious node detection in cluster-based sensor networks
    • M.-Y. Hsieh, Y.-M. Huang, and H.-C. Chao, "Adaptive security design with malicious node detection in cluster-based sensor networks, " Comput. Commun., vol. 30, nos. 11-12, pp. 2385-2400, 2007.
    • (2007) Comput. Commun , vol.30 , Issue.11-12 , pp. 2385-2400
    • Hsieh, M.-Y.1    Huang, Y.-M.2    Chao, H.-C.3
  • 32
    • 84863512174 scopus 로고    scopus 로고
    • ReTrust: Attack-resistant and lightweight trust management for medical sensor networks
    • Jul
    • D. He, C. Chen, S. Chan, J. Bu, and A. V. Vasilakos, "ReTrust: Attack-resistant and lightweight trust management for medical sensor networks, " IEEE Trans. Inf. Technol. Biomed., vol. 16, no. 4, pp. 623-632, Jul. 2012.
    • (2012) IEEE Trans. Inf. Technol. Biomed , vol.16 , Issue.4 , pp. 623-632
    • He, D.1    Chen, C.2    Chan, S.3    Bu, J.4    Vasilakos, A.V.5
  • 33
    • 84858068452 scopus 로고    scopus 로고
    • TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks
    • F. G. Mármol and G. M. Pérez, "TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks, " J. Netw. Comput. Appl., vol. 35, no. 3, pp. 934-941, 2012.
    • (2012) J. Netw. Comput. Appl , vol.35 , Issue.3 , pp. 934-941
    • Mármol, F.G.1    Pérez, G.M.2
  • 34
    • 79960917485 scopus 로고    scopus 로고
    • SensorTrust: A resilient trust model for wireless sensing systems
    • G. Zhan, W. Shi, and J. Deng, "SensorTrust: A resilient trust model for wireless sensing systems, " Pervasive Mobile Comput., vol. 7, no. 4, pp. 509-522, 2012.
    • (2012) Pervasive Mobile Comput , vol.7 , Issue.4 , pp. 509-522
    • Zhan, G.1    Shi, W.2    Deng, J.3
  • 35
    • 50149105732 scopus 로고    scopus 로고
    • Impact of denial of service attacks on ad hoc networks
    • Aug
    • I. Aad, J.-P. Hubaux, and E. W. Knightly, "Impact of denial of service attacks on ad hoc networks, " IEEE-ACM Trans. Netw., vol. 16, no. 4, pp. 791-802, Aug. 2008.
    • (2008) IEEE -ACM Trans. Netw , vol.16 , Issue.4 , pp. 791-802
    • Aad, I.1    Hubaux, J.-P.2    Knightly, E.W.3
  • 36
    • 84927649723 scopus 로고    scopus 로고
    • Quantifying the severity of blackhole attack in wireless mobile adhoc networks
    • Berlin, Germany: Springer
    • S. Mandala, K. Jenni, A. Ngadi, M. Kamat, and Y. Coulibaly, "Quantifying the severity of blackhole attack in wireless mobile adhoc networks, " in Security in Computing and Communications. Berlin, Germany: Springer, 2014, pp. 57-67.
    • (2014) Security in Computing and Communications , pp. 57-67
    • Mandala, S.1    Jenni, K.2    Ngadi, A.3    Kamat, M.4    Coulibaly, Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.