Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2015 (2015), Article ID 716468, 10 pages
http://dx.doi.org/10.1155/2015/716468
Research Article

Trust-Aware and Low Energy Consumption Security Topology Protocol of Wireless Sensor Network

1College of Computer Science and Electronic Engineering, Hunan University, Changsha, Hunan 410082, China
2Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China
3School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China

Received 18 August 2014; Accepted 8 October 2014

Academic Editor: Fei Yu

Copyright © 2015 Zuo Chen et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. T. Eswari and V. Vanitha, “A novel rule based intrusion detection framework for Wireless Sensor Networks,” in Proceedings of the International Conference on Information Communication and Embedded Systems (ICICES '13), pp. 1019–1022, IEEE, Chennai, India, February 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. F. Gao, H.-L. Wen, L.-F. Zhao, and Y. Chen, “Design and optimization of a cross-layer routing protocol for multi-hop wireless sensor networks,” in Proceedings of the International Conference on Sensor Network Security Technology and Privacy Communication System (SNS & PCS '13), pp. 5–8, Nangang, China, May 2013. View at Publisher · View at Google Scholar · View at Scopus
  3. Z. Li, N. Wang, A. Franzen et al., “Practical deployment of an in-field soil property wireless sensor network,” Computer Standards and Interfaces, vol. 36, no. 2, pp. 278–287, 2014. View at Publisher · View at Google Scholar · View at Scopus
  4. L. Yu, N. Wang, and X. Meng, “Real-time forest fire detection with wireless sensor networks,” in Proceedings of the International Conference on Wireless Communications, Networking and Mobile Computing (WCNM '05), pp. 1214–1217, September 2005. View at Scopus
  5. X. Liu, H. Zhao, X. Yang, and X. Li, “SinkTrail: a proactive data reporting protocol for wireless sensor networks,” IEEE Transactions on Computers, vol. 62, no. 1, pp. 151–162, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  6. J. Q. Zhang, R. Shankaran, M. A. Orgun et al., “A dynamic trust establishment and management framework for wireless sensor networks,” in Proceedings of the 8th International Conference on Embedded and Ubiquitous Computing (EUC '10), pp. 11–13, 2010.
  7. J. Q. Duan, D. Y. Gao, D. Yang et al., “An energy-aware trust derivation scheme with game theoretic approach in wireless sensor networks for IoT applications,” IEEE Internet of Things Journal, vol. 1, no. 1, pp. 58–69, 2014. View at Google Scholar
  8. J. Duan, D. Yang, H. Zhu, S. Zhang, and J. Zhao, “TSRF: a trust-aware secure routing framework in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 209436, 14 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. G. Zhan, W. Shi, and J. Deng, “Design and implementation of TARF: a trust-aware routing framework for WSNs,” IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 2, pp. 184–197, 2012. View at Publisher · View at Google Scholar · View at Scopus
  10. R. A. Raje and A. V. Sakhare, “Routing in wireless sensor network using fuzzy based trust model,” in Proceedings of the 4th International Conference on Communication Systems and Network Technologies (CSNT ’14), pp. 7–9, 2014.
  11. G. V. Crosby, N. Pissinou, and J. Gadze, “A framework for trust-based cluster head election in wireless sensor network,” in Proceedings of the 2nd IEEE Workshop on Dependability and Security in Sensor Network and Systems(DSSNS '10), pp. 24–28, 2006.
  12. H. Safa, H. Artail, and D. Tabet, “A cluster-based trust-aware routing protocol for mobile ad hoc networks,” Wireless Networks, vol. 16, no. 4, pp. 969–984, 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. W. R. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd International Conference on System Sciences, pp. 1–10, Maui, Hawaii, USA, 2000.
  14. W. Wang, F. Du, and Q. Xu, “An improvement of LEACH routing protocol based on trust for wireless sensor networks,” in Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '09), pp. 1–4, Beijing, China, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  15. A. Rezgui and M. Eltoweissy, “TARP: a trust-aware routing protocol for sensor-actuator networks,” in Proceedings of the IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems (MASS '07), pp. 1–9, IEEE, Pisa, Italy, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  16. W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002. View at Publisher · View at Google Scholar · View at Scopus
  17. H. Liu, Y. Fang, X. Hao, J. Dou, H. Li, and W. Bi, “Research of inter-cluster multi-hop routing algorithm for wireless sensor networks,” in Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering (ISKE '08), vol. 1, pp. 1367–1372, Xiamen, China, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  18. W. B. Heinzelman, A. P. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Transactions on Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002. View at Publisher · View at Google Scholar · View at Scopus