Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2015 (2015), Article ID 430456, 10 pages
http://dx.doi.org/10.1155/2015/430456
Research Article

A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Trust Value

1College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan 410082, China
2Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
3School of Education, Hubei University, Wuhan, Hubei 430062, China

Received 18 August 2014; Accepted 8 October 2014

Academic Editor: Fei Yu

Copyright © 2015 Zuo Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. F. Akyildiz, W. Su, Y. Sankarasubramaniam et al., “Wireless sensor networks: a survey,” Computer Networks, vol. 38, no. 4, pp. 393–422, 2002. View at Google Scholar
  2. K. Nagarathna, Y. B. Kiran, J. D. Mallapur, and S. Hiremath, “Trust based secured routing in wireless multimedia sensor networks,” in Proceedings of the 4th International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN '12), pp. 53–58, IEEE Press, Piscataway, NJ, USA, July 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. Y. Chen and J. Shu, “Wireless sensor networks security issues as smart materials systems,” Applied Mechanics and Materials, vol. 63-64, pp. 497–501, 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. Z. Y. Tao and M. Hu, “Time synchronization algorithm based on hierarchical structure in wireless sensor network,” Journal of Computer Applications, vol. 32, no. 6, pp. 1513–1515, 2012. View at Google Scholar
  5. H. Gobjuka and Y. Breitbart, “Discovering network topology of large multi subnet ethernet networks,” in Proceedings of the 32nd IEEE Conference on Local Computer Networks (LCN '07), pp. 428–435, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. L. Qionglin, “Inclusion-exclusion principle and application,” China Science and Technology Information, vol. 20, no. 8, pp. 58–59, 2012. View at Google Scholar
  7. A. Francy Golda, S. Aridha, and D. Elakkiya, “Algorithmic agent for effective mobile robot navigation in an unknown environment,” in Proceedings of the International Conference on Intelligent Agent and Multi-Agent Systems (IAMA '09), pp. 1–4, Chennai, India, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  8. W. R. Pires, T. H. P. Figueiredo, H. C. Wong, and A. A. F. Loureiro, “Malicious node detection in wireless sensor networks,” in Proceedings of the 18th International Parallel and Distributed Processing Symposium, 2004.
  9. C. Wang, X. Y. Jia, and Q. Lin, “Trust based secure routing algorithm for wireless sensor networks,” Journal on Communications, vol. 29, no. 11, pp. 105–112, 2008. View at Google Scholar · View at Scopus
  10. L. Zhang, L. Li, and C. Li, “A wireless sensor network routing algorithm based on subjective logic trusted,” Wuhan University of Technology, vol. 33, no. 1, pp. 75–78, 2009. View at Google Scholar
  11. Z. Cheng, Z. Ming-Zheng, and X. Jinsheng, “BTSR: A behavior-based safety data fusion and routing algorithm credible,” Journal of Computer Applications, vol. 28, no. 11, pp. 2820–2823, 2008. View at Google Scholar
  12. D. Shuhao and L. Xiaolon, “Reliable coverage algorithm in wireless sensor networks based on grid trust,” Application Research of Computers, vol. 31, no. 1, pp. 253–256, 2014. View at Google Scholar
  13. E. Bonabeau, M. Dorigo, and G. Theraulaz, Swarm Intelligence: From Natural to Artificial Systems, Oxford University Press, Oxford, UK, 1999.
  14. J. Kennedy and R. Eberhart, “Particle swarm optimization,” in Proceedings of the IEEE International Conference on Neural Networks, pp. 1942–1948, December 1995. View at Scopus
  15. L. Jianping, X. Li, and C. Minrong, “SFLA the Markov model and its convergence analysis,” Acta Electronica Sinica, vol. 38, no. 12, pp. 2875–2880, 2010. View at Google Scholar
  16. E. Sun, “A survey on clustering routing protocols based on PSO in WSN,” TELKOMNIKA Indonesian Journal of Electrical Engineering, vol. 12, no. 7, 2014. View at Google Scholar
  17. J.-P. Luo, X. Li, and M.-R. Chen, “The Markov model of shuffled frog leaping algorithm and its convergence analysis,” Acta Electronica Sinica, vol. 38, no. 12, pp. 2875–2880, 2010. View at Google Scholar · View at Scopus
  18. K. N. Krishnanand and D. Ghose, “Theoretical foundations for rendezvous of glowworm-inspired agent swarms at multiple locations,” Robotics and Autonomous Systems, vol. 56, no. 7, pp. 549–569, 2008. View at Publisher · View at Google Scholar · View at Scopus
  19. K. N. Krishnanand and D. Ghose, “Glowworm swarm optimization:a new method for optimizing multi-modal functions,” International Journal of Computational Intelligence Studies, vol. 1, no. 1, pp. 93–119, 2009. View at Google Scholar
  20. K. Huang and Y. Zhou, “Improved variation step adaptive GSO algorithm,” Computer Engineering, vol. 38, no. 4, pp. 185–187, 2012. View at Google Scholar