This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer networks, vol. 38, no. 4, pp. 393-422, 2002.10.1016/S1389-1286(01)00302-4Search in Google Scholar
S. D. T. Kelly, N. K. Suryadevara, and S. C. Mukhopadhyay, “Towards the implementation of iot for environmental condition monitoring in homes,” IEEE Sensors Jou rnal, vol. 13, no. 10, pp. 3846-3853, 2013.Search in Google Scholar
C. Intanagonwiwat, R. Govindan, and D. Estrin, “Directed diffusion: a scalable and robust communication paradigm for sensor networks,” in Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 56-67, ACM, 2000.10.1145/345910.345920Search in Google Scholar
W. R. Heinzelman, J. Kulik, and H. Balakrishnan, “Adaptive protocols for information dissemination in wireless sensor networks,” in Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking, pp. 174-185, ACM, 1999.10.1145/313451.313529Search in Google Scholar
W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd annual Hawaii International conference on System sciences, pp. 10-pp, IEEE, 2000.Search in Google Scholar
S. Lindsey and C. S. Raghavendra, “Pegasis: Power-efficient gathering in sensor information systems,” in IEEE Aerospace conference proceedings, vol. 3, pp. 3-1125, IEEE, 2002.Search in Google Scholar
O. Younis and S. Fahmy, “Heed: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks,” IEEE Transactions on Mobile Computing, vol. 3, no. 4, pp. 366-379, 2004.10.1109/TMC.2004.41Search in Google Scholar
P. K. Batra and K. Kant, “Stable cluster head selection in leach protocol: a cross-layer approach,” in Proceedings of the 7th ACM India Computing Conference, p. 15, ACM, 2014.10.1145/2675744.2675761Search in Google Scholar
S. Ozdemir and Y. Xiao, “Secure data aggregation in wireless sensor networks: A comprehensive overview,” Computer Networks, vol. 53, no. 12, pp. 2022-2037, 2009.Search in Google Scholar
M. R. Juliana and S. Srinivasan, “Seladg: Secure energy e_cient location aware data gathering approach for wireless sensor networks,” International Journal on Smart Sensing & Intelligent Systems, vol. 8, no. 3, 2015.10.21307/ijssis-2017-828Search in Google Scholar
S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure data aggregation in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 1040-1052, 2012.Search in Google Scholar
V. P. Illiano and E. C. Lupu, “Detecting malicious data injections in wireless sensor networks: a survey,” ACM Computing Surveys (CSUR), vol. 48, no. 2, p. 24, 2015.10.1145/2818184Search in Google Scholar
I. Butun, S. D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 16, no. 1, pp. 266-282, 2014.10.1109/SURV.2013.050113.00191Search in Google Scholar
D. Bhattacharjee and R. Bera, “Development of smart detachable wireless sensing system for environmental monitoring,” International Journal on Smart Sensing and Intelligent Systems, vol. 7, no. 3, pp. 1239-1253, 2014.Search in Google Scholar
J. Hur, Y. Lee, S. Hong, and H. Yoon, “Trust-based secure aggregation in wireless sensor networks,” in Proceedings of the 3rd International Conference on Computing, Communications and Control Technologies, vol. 3, pp. 1-6, 2005.Search in Google Scholar
I. M. Atakli, H. Hu, Y. Chen, W. S. Ku, and Z. Su, “Malicious node detection in wireless sensor networks using weighted trust evaluation,” in Proceedings of the 2008 Spring simulation multiconference, pp. 836-843, Society for Computer Simulation International, 2008.Search in Google Scholar
F. Song and B. Zhao, “Trust-based leach protocol for wireless sensor networks,” in Second International Conference on Future Generation Communication and Networking, vol. 1, pp. 202-207, IEEE, 2008.10.1109/FGCN.2008.41Search in Google Scholar
W. Weichao, D. Fei, and X. Qijian, “An improvement of leach routing protocol based on trust for wireless sensor networks,” in eless Communications, Networking and Mobile Computing, pp. 1-4, IEEE, 2009.Search in Google Scholar
H. Alzaid, E. Foo, and J. G. Nieto, “Rsda: reputation-based secure data aggregation in wireless sensor networks,” in 9th International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 419-424, IEEE, 2008.10.1109/PDCAT.2008.52Search in Google Scholar
H. Deng, G. Jin, K. Sun, R. Xu, M. Lyell, and J. A. Luke, “Trust-aware in-network aggregation for wireless sensor networks,” in IEEE Global Telecommunications Conference, GLOBECOM 2009, pp. 1-8, IEEE, 2009.10.1109/GLOCOM.2009.5426033Search in Google Scholar
B. Stelte and A. Matheus, “Secure trust reputation with multi-criteria decision making for wireless sensor networks data aggregation,” in IEEE Sensors, pp. 920-923, IEEE, 2011.10.1109/ICSENS.2011.6126929Search in Google Scholar
L. Yang and M. Moh, “Dual trust secure protocol for cluster-based wireless sensor networks,” in 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR), pp. 1645-1649, IEEE, 2011.Search in Google Scholar
Y. Sun, H. Luo, and S. K. Das, “A trust-based framework for fault-tolerant data aggregation in wireless multimedia sensor networks,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 785-797, 2012.10.1109/TDSC.2012.68Search in Google Scholar
M. R. Rohbanian, M. R. Kharazmi, A. Keshavarz-Haddad, and M. Keshtgary, “Watchdog-leach: a new method based on leach protocol to secure clustered wireless sensor networks,” arXiv preprint arXiv:1310.3637, 2013.Search in Google Scholar
M. Sandhya, K. Murugan, and P. Devaraj, “False data elimination in heterogeneous wireless sensor networks using locationbased selection of aggregator nodes,” IETE Journal of Research, vol. 60, no. 2, pp. 145-155, 2014.10.1080/03772063.2014.914693Search in Google Scholar
S. Roy, M. Conti, S. Setia, and S. Jajodia, “Secure data aggregation in wireless sensor networks: filtering out the attackers impact,” 2014.10.1109/TIFS.2014.2307197Search in Google Scholar
Y. Liu, X. Gong, and C. Xing, “A novel trust-based secure data aggregation for internet of things,” in 9th International Conference on Computer Science & Education (ICCSE), pp. 435-439, IEEE, 2014.Search in Google Scholar
V. Geetha and K. Chandrasekaran, “Trust factor based leach-c protocol for wireless sensor networks,” International Journal of Computer Applications, vol. 105, no. 18, 2014.10.5120/18700-9895Search in Google Scholar
S. Das and A. Das, “An algorithm to detect malicious nodes in wireless sensor network using enhanced leach protocol,” in International Conference on Advances in Computer Engineering and Applications (ICACEA), pp. 875-881, IEEE, 2015.10.1109/ICACEA.2015.7164828Search in Google Scholar
A. Miglani, T. Bhatia, and S. Goel, “Trust based energy efficient routing in leach for wireless sensor network,” in Global Conference on Communication Technologies (GCCT), pp. 361-365, IEEE, 2015.10.1109/GCCT.2015.7342684Search in Google Scholar
H.-J. Liao, C.-H. R. Lin, Y.-C. Lin, and K.-Y. Tung, “Intrusion detection system: A comprehensive review,” Journal of Network and Computer Applications, vol. 36, no. 1, pp. 16-24, 2013.10.1016/j.jnca.2012.09.004Search in Google Scholar
K. Ioannis, T. Dimitriou, and F. C. Freiling, “Towards intrusion detection in wireless sensor networks,” in Proc. of the 13th European Wireless Conference, 2007.Search in Google Scholar
I. Krontiris, T. Dimitriou, T. Giannetsos, and M. Mpasoukos, “Intrusion detection of sinkhole attacks in wireless sensor networks,” in Algorithmic Aspects of Wireless Sensor Networks, pp. 150-161, Springer, 2007.10.1007/978-3-540-77871-4_14Search in Google Scholar
M. S. I. Mamun and A. S. Kabir, “Hierarchical design based intrusion detection system for wireless ad hoc sensor network,” International Journal of Network Security & Its Applications (IJNSA), vol. 2, no. 3, pp. 102-117, 2010.10.5121/ijnsa.2010.2307Search in Google Scholar
F. Bao, R. Chen, M. Chang, and J.-H. Cho, “Trust-based intrusion detection in wireless sensor networks,” in IEEE International Conference on Communications (ICC), pp. 1-6, IEEE, 2011.10.1109/icc.2011.5963250Search in Google Scholar
W. Shen, G. Han, L. Shu, J. J. Rodrigues, and N. Chilamkurti, “A new energy prediction approach for intrusion detection in cluster-based wireless sensor networks,” in Green Communications and Networking, pp. 1-12, Springer, 2011.10.1007/978-3-642-33368-2_1Search in Google Scholar
F. Hidoussi, H. Toral-Cruz, D. E. Boubiche, K. Lakhtaria, A. Mihovska, and M. Voznak, “Centralized ids based on misuse detection for cluster-based wireless sensors networks,” Wireless Personal Communications, vol. 85, no. 1, pp. 207-224, 2015.10.1007/s11277-015-2734-2Search in Google Scholar
D. Singh and S. Bedi, “Trust aware intrusion detection system based on cluster,” International Journal of Computer Applications, vol. 131, no. 7, pp. 7-13, 2015.10.5120/ijca2015907302Search in Google Scholar
A. Ahmed, K. A. Bakar, M. I. Channa, K. Haseeb, and A. W. Khan, “A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks,” Frontiers of Computer Science, vol. 9, no. 2, pp. 280-296, 2015.10.1007/s11704-014-4212-5Search in Google Scholar
P. R. Vamsi and K. Kant, “Systematic design of trust management systems for wireless sensor networks: A review,” in Fourth International Conference on Advanced Computing & Communication Technologies (ACCT), Rohtak, India, pp. 208-215, IEEE, 2014.10.1109/ACCT.2014.28Search in Google Scholar
ns 2.35, “Network simulator ns-2.35.” http://www.isi.edu/nsnam/ns, 2014. Accessed: 2016-01-10.Search in Google Scholar
Ganeriwal, Saurabh, Laura K. Balzano, and Mani B. Srivastava. “Reputation-based framework for high integrity sensor networks.” ACM Transactions on Sensor Networks (TOSN), vol. 4, no. 3, 2008, 15, pp 1-37.10.1145/1362542.1362546Search in Google Scholar