Open Access

Trust Aware Data Aggregation And Intrusion Detection System For Wireless Sensor Networks


Cite

I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer networks, vol. 38, no. 4, pp. 393-422, 2002.10.1016/S1389-1286(01)00302-4 Search in Google Scholar

S. D. T. Kelly, N. K. Suryadevara, and S. C. Mukhopadhyay, “Towards the implementation of iot for environmental condition monitoring in homes,” IEEE Sensors Jou rnal, vol. 13, no. 10, pp. 3846-3853, 2013. Search in Google Scholar

C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 56-67, ACM, 2000.10.1145/345910.345920 Search in Google Scholar

W. R. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks,” in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp. 174-185, ACM, 1999.10.1145/313451.313529 Search in Google Scholar

W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd annual Hawaii International conference on System sciences, pp. 10-pp, IEEE, 2000. Search in Google Scholar

S. Lindsey and C. S. Raghavendra, “Pegasis: Power-efficient gathering in sensor information systems,” in IEEE Aerospace conference proceedings, vol. 3, pp. 3-1125, IEEE, 2002. Search in Google Scholar

O. Younis and S. Fahmy, “Heed: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366-379, 2004.10.1109/TMC.2004.41 Search in Google Scholar

P. K. Batra and K. Kant, “Stable cluster head selection in leach protocol: a cross-layer approach,” in Proceedings of the 7th ACM India Computing Conference, p. 15, ACM, 2014.10.1145/2675744.2675761 Search in Google Scholar

S. Ozdemir and Y. Xiao, “Secure data aggregation in wireless sensor networks: A comprehensive overview,” Computer Networks, vol. 53, no. 12, pp. 2022-2037, 2009. Search in Google Scholar

M. R. Juliana and S. Srinivasan, “Seladg: Secure energy e_cient location aware data gathering approach for wireless sensor networks,” International Journal on Smart Sensing & Intelligent Systems, vol. 8, no. 3, 2015.10.21307/ijssis-2017-828 Search in Google Scholar

S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure data aggregation in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1040-1052, 2012. Search in Google Scholar

V. P. Illiano and E. C. Lupu, “Detecting malicious data injections in wireless sensor networks: a survey,” ACM Computing Surveys (CSUR), vol. 48, no. 2, p. 24, 2015.10.1145/2818184 Search in Google Scholar

I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266-282, 2014.10.1109/SURV.2013.050113.00191 Search in Google Scholar

D. Bhattacharjee and R. Bera, “Development of smart detachable wireless sensing system for environmental monitoring,” International Journal on Smart Sensing and Intelligent Systems, vol. 7, no. 3, pp. 1239-1253, 2014. Search in Google Scholar

J. Hur, Y. Lee, S. Hong, and H. Yoon, “Trust-based secure aggregation in wireless sensor networks,” in Proceedings of the 3rd International Conference on Computing, Communications and Control Technologies, vol. 3, pp. 1-6, 2005. Search in Google Scholar

I. M. Atakli, H. Hu, Y. Chen, W. S. Ku, and Z. Su, “Malicious node detection in wireless sensor networks using weighted trust evaluation,” in Proceedings of the 2008 Spring simulation multiconference, pp. 836-843, Society for Computer Simulation International, 2008. Search in Google Scholar

F. Song and B. Zhao, “Trust-based leach protocol for wireless sensor networks,” in Second International Conference on Future Generation Communication and Networking, vol. 1, pp. 202-207, IEEE, 2008.10.1109/FGCN.2008.41 Search in Google Scholar

W. Weichao, D. Fei, and X. Qijian, “An improvement of leach routing protocol based on trust for wireless sensor networks,” in eless Communications, Networking and Mobile Computing, pp. 1-4, IEEE, 2009. Search in Google Scholar

H. Alzaid, E. Foo, and J. G. Nieto, “Rsda: reputation-based secure data aggregation in wireless sensor networks,” in 9th International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 419-424, IEEE, 2008.10.1109/PDCAT.2008.52 Search in Google Scholar

H. Deng, G. Jin, K. Sun, R. Xu, M. Lyell, and J. A. Luke, “Trust-aware in-network aggregation for wireless sensor networks,” in IEEE Global Telecommunications Conference, GLOBECOM 2009, pp. 1-8, IEEE, 2009.10.1109/GLOCOM.2009.5426033 Search in Google Scholar

B. Stelte and A. Matheus, “Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation,” in IEEE Sensors, pp. 920-923, IEEE, 2011.10.1109/ICSENS.2011.6126929 Search in Google Scholar

L. Yang and M. Moh, “Dual trust secure protocol for cluster-based wireless sensor networks,” in 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), pp. 1645-1649, IEEE, 2011. Search in Google Scholar

Y. Sun, H. Luo, and S. K. Das, “A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 785-797, 2012.10.1109/TDSC.2012.68 Search in Google Scholar

M. R. Rohbanian, M. R. Kharazmi, A. Keshavarz-Haddad, and M. Keshtgary, “Watchdog-leach: a new method based on leach protocol to secure clustered wireless sensor networks,” arXiv preprint arXiv:1310.3637, 2013. Search in Google Scholar

M. Sandhya, K. Murugan, and P. Devaraj, “False data elimination in heterogeneous wireless sensor networks using locationbased selection of aggregator nodes,” IETE Journal of Research, vol. 60, no. 2, pp. 145-155, 2014.10.1080/03772063.2014.914693 Search in Google Scholar

S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure data aggregation in wireless sensor networks: filtering out the attackers impact,” 2014.10.1109/TIFS.2014.2307197 Search in Google Scholar

Y. Liu, X. Gong, and C. Xing, “A novel trust-based secure data aggregation for internet of things,” in 9th International Conference on Computer Science & Education (ICCSE), pp. 435-439, IEEE, 2014. Search in Google Scholar

V. Geetha and K. Chandrasekaran, “Trust factor based leach-c protocol for wireless sensor networks,” International Journal of Computer Applications, vol. 105, no. 18, 2014.10.5120/18700-9895 Search in Google Scholar

S. Das and A. Das, “An algorithm to detect malicious nodes in wireless sensor network using enhanced leach protocol,” in International Conference on Advances in Computer Engineering and Applications (ICACEA), pp. 875-881, IEEE, 2015.10.1109/ICACEA.2015.7164828 Search in Google Scholar

A. Miglani, T. Bhatia, and S. Goel, “Trust based energy efficient routing in leach for wireless sensor network,” in Global Conference on Communication Technologies (GCCT), pp. 361-365, IEEE, 2015.10.1109/GCCT.2015.7342684 Search in Google Scholar

H.-J. Liao, C.-H. R. Lin, Y.-C. Lin, and K.-Y. Tung, “Intrusion detection system: A comprehensive review,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 16-24, 2013.10.1016/j.jnca.2012.09.004 Search in Google Scholar

K. Ioannis, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. of the 13th European Wireless Conference, 2007. Search in Google Scholar

I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos, “Intrusion detection of sinkhole attacks in wireless sensor networks,” in Algorithmic Aspects of Wireless Sensor Networks, pp. 150-161, Springer, 2007.10.1007/978-3-540-77871-4_14 Search in Google Scholar

M. S. I. Mamun and A. S. Kabir, “Hierarchical design based intrusion detection system for wireless ad hoc sensor network,” International Journal of Network Security & Its Applications (IJNSA), vol. 2, no. 3, pp. 102-117, 2010.10.5121/ijnsa.2010.2307 Search in Google Scholar

F. Bao, R. Chen, M. Chang, and J.-H. Cho, “Trust-based intrusion detection in wireless sensor networks,” in IEEE International Conference on Communications (ICC), pp. 1-6, IEEE, 2011.10.1109/icc.2011.5963250 Search in Google Scholar

W. Shen, G. Han, L. Shu, J. J. Rodrigues, and N. Chilamkurti, “A new energy prediction approach for intrusion detection in cluster-based wireless sensor networks,” in Green Communications and Networking, pp. 1-12, Springer, 2011.10.1007/978-3-642-33368-2_1 Search in Google Scholar

F. Hidoussi, H. Toral-Cruz, D. E. Boubiche, K. Lakhtaria, A. Mihovska, and M. Voznak, “Centralized ids based on misuse detection for cluster-based wireless sensors networks,” Wireless Personal Communications, vol. 85, no. 1, pp. 207-224, 2015.10.1007/s11277-015-2734-2 Search in Google Scholar

D. Singh and S. Bedi, “Trust aware intrusion detection system based on cluster,” International Journal of Computer Applications, vol. 131, no. 7, pp. 7-13, 2015.10.5120/ijca2015907302 Search in Google Scholar

A. Ahmed, K. A. Bakar, M. I. Channa, K. Haseeb, and A. W. Khan, “A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks,” Frontiers of Computer Science, vol. 9, no. 2, pp. 280-296, 2015.10.1007/s11704-014-4212-5 Search in Google Scholar

P. R. Vamsi and K. Kant, “Systematic design of trust management systems for wireless sensor networks: A review,” in Fourth International Conference on Advanced Computing & Communication Technologies (ACCT), Rohtak, India, pp. 208-215, IEEE, 2014.10.1109/ACCT.2014.28 Search in Google Scholar

M. Natrella, “Nist/sematech e-handbook of statistical methods,” 2010. Search in Google Scholar

ns 2.35, “Network simulator ns-2.35.” http://www.isi.edu/nsnam/ns, 2014. Accessed: 2016-01-10. Search in Google Scholar

Ganeriwal, Saurabh, Laura K. Balzano, and Mani B. Srivastava. “Reputation-based framework for high integrity sensor networks.” ACM Transactions on Sensor Networks (TOSN), vol. 4, no. 3, 2008, 15, pp 1-37.10.1145/1362542.1362546 Search in Google Scholar

eISSN:
1178-5608
Language:
English
Publication timeframe:
Volume Open
Journal Subjects:
Engineering, Introductions and Overviews, other