Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 5986265, 9 pages
http://dx.doi.org/10.1155/2016/5986265
Research Article

R-bUCRP: A Novel Reputation-Based Uneven Clustering Routing Protocol for Cognitive Wireless Sensor Networks

Information Engineering College, Henan University of Science and Technology, Luoyang 471023, China

Received 23 March 2016; Revised 17 June 2016; Accepted 28 June 2016

Academic Editor: Iftikhar Ahmad

Copyright © 2016 Mingchuan Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Mitola III and G. Q. Maguire Jr., “Cognitive radio: making software radios more personal,” IEEE Personal Communications, vol. 6, no. 4, pp. 13–18, 1999. View at Publisher · View at Google Scholar · View at Scopus
  2. R. Urgaonkar and M. J. Neely, “Opportunistic scheduling with reliability guarantees in cognitive radio networks,” in Proceedings of the IEEE Conference on Computer Communications (INFOCOM '08), Phoenix, Ariz, USA, April 2008.
  3. E. Dall'Anese, S.-J. Kim, G. B. Giannakis, and S. Pupolin, “Power allocation for cognitive radio networks under channel uncertainty,” in Proceedings of the IEEE International Conference on Communications (ICC '11), pp. 1–6, Kyoto, Japan, June 2011. View at Publisher · View at Google Scholar · View at Scopus
  4. R. W. Thomas, D. H. Friend, L. A. DaSilva, and A. B. MacKenzie, “Cognitive networks: adaptation and learning to achieve end-to-end performance objectives,” IEEE Communications Magazine, vol. 44, no. 12, pp. 51–57, 2006. View at Publisher · View at Google Scholar · View at Scopus
  5. C. Fortuna and M. Mohorcic, “Trends in the development of communication networks: cognitive networks,” Computer Networks, vol. 53, no. 9, pp. 1354–1376, 2009. View at Publisher · View at Google Scholar · View at Scopus
  6. A. Rabbachin, T. Q. S. Quek, H. Shin, and M. Z. Win, “Cognitive network interference,” IEEE Journal on Selected Areas in Communications, vol. 29, no. 2, pp. 480–493, 2011. View at Publisher · View at Google Scholar · View at Scopus
  7. M. Zhang, H. Zhao, R. Zheng, Q. Wu, and W. Wei, “Cognitive internet of things: concepts and application example,” International Journal of Computer Science Issues, vol. 9, no. 6, pp. 151–158, 2012. View at Google Scholar
  8. M. Zhang, Y. Qiu, R. Zheng, X. Bai, W. Wei, and Q. Wu, “A novel architecture for cognitive internet of things,” International Journal of Security and Its Applications, vol. 9, no. 9, pp. 235–252, 2015. View at Publisher · View at Google Scholar · View at Scopus
  9. R. Zheng, Q. Wu, M. Zhang, G. Li, J. Pu, and H. Wang, “A self optimization mechanism of system service performance based on autonomic computing,” Computer Research and Development, vol. 48, no. 9, pp. 1676–1684, 2011 (Chinese). View at Google Scholar
  10. M. Zhang, R. Zheng, Q. Wu, W. Wei, X. Bai, and H. Zhao, “B-iTRS: a bio-inspired trusted routing scheme for wireless sensor networks,” Journal of Sensors, vol. 2015, Article ID 156843, 8 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. R.-I. Ciobanu, C. Dobre, M. Dascălu, Ş. Trăuşan-Matu, and V. Cristea, “SENSE: a collaborative selfish node detection and incentive mechanism for opportunistic networks,” Journal of Network and Computer Applications, vol. 41, no. 1, pp. 240–249, 2014. View at Publisher · View at Google Scholar · View at Scopus
  12. W. Guo, R.-Z. Xu, and B. Liu, “Research on subjective trust routing algorithm for mobile ad hoc networks,” in Proceedings of the 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '10), pp. 1–6, IEEE, Chengdu, China, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  13. W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proceedings of the 33rd Annual Hawaii International Conference on System Siences (HICSS '33), Maui, Hawaii, USA, January 2000. View at Scopus
  14. A. Manjeshwar and D. Agrawal, “TEEN: a protocol for enhanced efficiency in wireless sensor networks,” in Proceedings of the 1st International Workshop on Parallel and Distributed Computing Issues in Wireless Networks and Mobile Computing, San Francisco, Calif, USA, 2001.
  15. A. Manjeshwar and D. P. Agarwal, “APTEEN: a hybrid protocol for efficient routing and comprehensive information retrieval in wireless sensor networks,” in Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS '02), pp. 195–202, Fort Lauderdale, Fla, USA, April 2002.
  16. L. Bhasker, “Genetically derived secure cluster-based data aggregation in wireless sensor networks,” IET Information Security, vol. 8, no. 1, pp. 1–7, 2014. View at Publisher · View at Google Scholar · View at Scopus
  17. H. Lin and H. Uster, “Exact and heuristic algorithms for data-gathering cluster-based wireless sensor network design problem,” IEEE/ACM Transactions on Networking, vol. 22, no. 3, pp. 903–916, 2014. View at Publisher · View at Google Scholar · View at Scopus
  18. P. T. A. Quang and D.-S. Kim, “An energy efficient clustering in heterogeneous wireless sensor and actuators networks,” in Proceedings of the IEEE Globecom Workshops (GC Wkshps '12), pp. 524–528, Anaheim, Calif, USA, December 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. K. Li and K. A. Hua, “Mobility-assisted distributed sensor clustering for energy-efficient wireless sensor networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM '13), pp. 316–321, IEEE, Atlanta, Ga, USA, December 2013. View at Publisher · View at Google Scholar · View at Scopus
  20. M. Ye, C. Li, G. Chen, and J. Wu, “EECS: an energy efficient clustering scheme in wireless sensor networks,” in Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference (PCCC '05), pp. 535–540, Phoenix, Ariz, USA, April 2005. View at Publisher · View at Google Scholar
  21. S. Soro and W. Heinzelman, “Prolonging the lifetime of wireless sensor networks via unequal clustering,” in Proceedings of the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (WMAN '05), Denver, Colo, USA, 2005.
  22. C. F. Li, M. Ye, G. H. Chen, and J. Wu, “An energy-efficient unequal clustering mechanism for wireless sensor networks,” in Proceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS '05), pp. 597–604, IEEE, Washington, DC, USA, November 2005. View at Publisher · View at Google Scholar · View at Scopus
  23. T. Chen, Y. Luo, F. Xiao, D. Shi, and S. Zhang, “Uneven clustering algorithm based on clustering optimization for wireless sensor networks,” Computer Science, vol. 41, no. 6A, pp. 289–292, 2014 (Chinese). View at Google Scholar
  24. C.-J. Jiang, W.-R. Shi, X.-L. Tang, P. Wang, and M. Xiang, “Energy-balanced unequal clustering routing protocol for wireless sensor networks,” Journal of Software, vol. 23, no. 5, pp. 1222–1232, 2012 (Chinese). View at Publisher · View at Google Scholar · View at Scopus
  25. S. Buchegger and Y. J. Le Boudec, “The selfish node: increasing routing security for mobile ad hoc networks,” LCA-Report 2001-008, 2001. View at Google Scholar
  26. P. Naghizadeh and M. Liu, “Perceptions and truth: a mechanism design approach to crowd-sourcing reputation,” IEEE/ACM Transactions on Networking, vol. 24, no. 1, pp. 163–175, 2016. View at Publisher · View at Google Scholar · View at Scopus
  27. Z. Li, H. Shen, and K. Sapra, “Leveraging social networks to combat collusion in reputation systems for peer-to-peer networks,” IEEE Transactions on Computers, vol. 62, no. 9, pp. 1745–1759, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  28. M. T. Refaei, L. A. DaSilva, M. Eltoweissy, and T. Nadeem, “Adaptation of reputation management systems to dynamic network conditions in ad hoc networks,” IEEE Transactions on Computers, vol. 59, no. 5, pp. 707–719, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  29. N. Labraoui, M. Gueroui, and L. Sekhri, “A risk-aware reputation-based trust management in wireless sensor networks,” Wireless Personal Communications, vol. 87, no. 3, pp. 1037–1055, 2016. View at Publisher · View at Google Scholar
  30. A. Capossele, G. De Cicco, and C. Petrioli, “R-CARP: a reputation based channel aware routing protocol for underwater acoustic sensor networks,” in Proceedings of the International Conference on Underwater Networks & Systems, Arlington, Va, USA, October 2015.
  31. P. Michiardi and R. Molva, “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” in Advanced Communications and Multimedia Security, B. Jerman-Blažič and T. Klobučar, Eds., vol. 100 of IFIP—The International Federation for Information Processing, pp. 107–121, Springer, New York, NY, USA, 2002. View at Publisher · View at Google Scholar
  32. M. Zhang, C. Xu, J. Guan, R. Zheng, Q. Wu, and H. Zhang, “A novel Physarum-inspired routing protocol for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 483581, 12 pages, 2013. View at Publisher · View at Google Scholar
  33. M. Zhang, C. Xu, J. Guan, R. Zheng, Q. Wu, and H. Zhang, “A novel bio-inspired trusted routing protocol for mobile wireless sensor networks,” KSII Transactions on Internet and Information Systems, vol. 8, no. 1, pp. 74–90, 2014. View at Publisher · View at Google Scholar · View at Scopus
  34. Q. Wu, X. Zhang, M. Zhang, Y. Lou, R. Zheng, and W. Wei, “Reputation revision method for selecting cloud services based on prior knowledge and a market mechanism,” The Scientific World Journal, vol. 2014, Article ID 617087, 9 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus