Accesso libero

Seladg: Secure Energy Efficient Location Aware Data Gathering Approach for Wireless Sensor Networks

INFORMAZIONI SU QUESTO ARTICOLO

Cita

S. Yoo, S.-h. Kang, and J. Kim, “SERA: a secure energy reliability aware data gathering for sensor networks,”Multimedia Tools and Applications, pp. 1-30, 2011/01/29 2011. Search in Google Scholar

Y. M. Zhou and L. Y. Li, “A Trust-Aware and Location-Based Secure Routing Protocol for WSN,”Applied Mechanics and Materials, vol. 373, pp. 1931-1934, 2013. Search in Google Scholar

E. Ahvar, A. Pourmoslemi, and M. J. Piran, “Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks,”arXiv preprint arXiv:1108.2777,2011. Search in Google Scholar

J. Bahi, C. Guyeux, and A. Makhoul, “Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach,” in Ad Hoc Networks. vol. 49, J. Zheng, D. Simplot-Ryl, and V. M. Leung, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 344-358. Search in Google Scholar

A. T. Boloorchi and M. H. Samadzadeh, “Energy-efficient and secure in-network storage and retrieval for WSNs: an adaptive approach,”The Journal of Supercomputing, vol. 65, pp. 961-977, 2013/08/01 2013.10.1007/s11227-013-0874-2 Search in Google Scholar

W. Jin, C. Jinsung, L. Sungyoung, C. Kwang-Cheng, and L. Young-Koo, “Hop-based energy aware routing algorithm for wireless sensor networks,”IEICE transactions on communications, vol. 93, pp. 305-316, 2010.10.1587/transcom.E93.B.305 Search in Google Scholar

V. Kumar and S. Madria, “Secure Data Aggregation in Wireless Sensor Networks,” in Wireless Sensor Network Technologies for the Information Explosion Era. vol. 278, T. Hara, V. Zadorozhny, and E. Buchmann, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 77-107.10.1007/978-3-642-13965-9_3 Search in Google Scholar

C. Ranhotigamage and S. C. Mukhopadhyay, “Field Trials and Performance Monitoring of Distributed Solar Panels Using a Low Cost Wireless Sensors Network for Domestic Applications”, IEEE Sensors Journal, Vol. 11, No. 10, October 2011, pp. 2583-2590.10.1109/JSEN.2011.2150214 Search in Google Scholar

B. Kumari, N. Vikram, and M. M. Reddy, “Secure Data Collection in Wireless Sensor Networks Using Random Routing Algorithms,”International Journal of Computer Science and Telecommunications, vol. 2, pp. 50-55, 2011. Search in Google Scholar

H. Li, K. Li, W. Qu, and I. Stojmenovic, “Secure and Energy-Efficient Data Aggregation with Malicious Aggregator Identification in Wireless Sensor Networks,” in Algorithms and Architectures for Parallel Processing. vol. 7016, Y. Xiang, A. Cuzzocrea, M. Hobbs, and W. Zhou, Eds., ed: Springer Berlin Heidelberg, 2011, pp. 2-13. Search in Google Scholar

W. Lu, Y. Liu, and D. Wang, “A Distributed Secure Data Collection Scheme via Chaotic Compressed Sensing in Wireless Sensor Networks,”Circuits, Systems, and Signal Processing, vol. 32, pp. 1363-1387, 2013/06/01 2013. Search in Google Scholar

P. Samundiswary, M. P. Kumar, and P. Dananjayan, “Trust Based Energy Aware Greedy Perimeter Stateless Routing for Wireless Sensor Networks,”Journal of Communication and Computer, vol. 8, pp. 848-854, 2011. Search in Google Scholar

T. Zahariadis, P. Trakadas, H. C. Leligou, S. Maniatis, and P. Karkazis, “A novel trust-aware geographical routing scheme for wireless sensor networks,”Wireless personal communications, vol. 69, pp. 805-826, 2013.10.1007/s11277-012-0613-7 Search in Google Scholar

H.-C. Leligou, P. Trakadas, S. Maniatis, P. Karkazis, and T. Zahariadis, “Combining trust with location information for routing in wireless sensor networks,”Wireless Communications and Mobile Computing, vol. 12, pp. 1091-1103, 2012. Search in Google Scholar

G. Zhan, W. Shi, and J. Deng, “Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs,”Dependable and Secure Computing, IEEE Transactions on, vol. 9, pp. 184-197, 2012.10.1109/TDSC.2011.58 Search in Google Scholar

G. V. Crosby, L. Hester, and N. Pissinou, “Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks,”IJ Network Security,vol. 12, pp. 107-117, 2011. Search in Google Scholar

R. Feng, X. Xu, X. Zhou, and J. Wan, “A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory,”Sensors, vol. 11, pp. 1345-1360, 2011. Search in Google Scholar

H. Zhao, Y. Li, M. Zhang, R. Zheng, and Q. Wu, “A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks,”International Journal of Computer Science Issues (IJCSI), vol. 10, 2013. Search in Google Scholar

J. Duan, D. Yang, H. Zhu, S. Zhang, and J. Zhao, “TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks,”International Journal of Distributed Sensor Networks, vol. 2014, 2014.10.1155/2014/209436 Search in Google Scholar

Y. Mao, “A secure mechanism for data collection in wireless sensor networks,”Applied Mathematics& Information Sciences, vol. 5, pp. 97-103, 2011. Search in Google Scholar

S.-I. Huang, S. Shieh, and J. Tygar, “Secure encrypted-data aggregation for wireless sensor networks,”Wireless Networks, vol. 16, pp. 915-927, 2010.10.1007/s11276-009-0177-y Search in Google Scholar

L. A. Villas, A. Boukerche, H. A. De Oliveira, R. B. De Araujo, and A. A. Loureiro, “A spatial correlation aware algorithm to perform efficient data collection in wireless sensor networks,”Ad Hoc Networks, vol. 12, pp. 69-85, 2014.10.1016/j.adhoc.2011.08.005 Search in Google Scholar

S. Xiao, B. Li, and X. Yuan, “Maximizing precision for energy-efficient data aggregation in wireless sensor networks with lossy links,”Ad Hoc Networks, vol. 26, pp. 103-113, 2015.10.1016/j.adhoc.2014.11.014 Search in Google Scholar

K. Yi, J. Wan, L. Yao, and T. Bao, “Partial Matrix Completion Algorithm for Efficient Data Gathering in Wireless Sensor Networks,”IEEE Communications Letters,, vol. 19, pp. 54-57, 2015.10.1109/LCOMM.2014.2371998 Search in Google Scholar

M. Naznin and A. S. Chowdhury, “ZDG: Energy efficient zone based data gathering in a wireless sensor network,” in International Conference on Networking Systems and Security (NSysS), 2015, pp. 1-7.10.1109/NSysS.2015.7043514 Search in Google Scholar

B. Wu, Y. Feng, and H. Zheng, “POSTERIOR BELIEF CLUSTERING ALGORITHM FOR ENERGY-EFFICIENT TRACKING IN WIRELESS SENSOR NETWORKS,”International Journal on Smart Sensing and Intelligent Systems, vol. 7, pp. 925-941, 2014.10.21307/ijssis-2017-688 Search in Google Scholar

X. Zhao, J. Minz, and S. K. Lim, “Low-power and reliable clock network design for through-silicon via (TSV) based 3D ICs,”IEEE Transactions on Components, Packaging and Manufacturing Technology, vol. 1, pp. 247-259, 2011.10.1109/TCPMT.2010.2099590 Search in Google Scholar

H. Wenbo, L. Xue, N. Hoang, K. Nahrstedt, and T. Abdelzaher, “PDA: PrivacyPreserving Data Aggregation in Wireless Sensor Networks,” in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, 2007, pp. 20452053.Search in Google Scholar

eISSN:
1178-5608
Lingua:
Inglese
Frequenza di pubblicazione:
Volume Open
Argomenti della rivista:
Engineering, Introductions and Overviews, other