Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 6102780, 12 pages
https://doi.org/10.1155/2017/6102780
Research Article

Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks

1School of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Jiangsu Province, Nanjing 210003, China

Correspondence should be addressed to Peng Li; nc.ude.tpujn@gnepil

Received 5 October 2016; Revised 6 January 2017; Accepted 19 January 2017; Published 8 March 2017

Academic Editor: Qing Yang

Copyright © 2017 Peng Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [11 citations]

The following is the list of published articles that have cited the current article.

  • Jennifer Simonjan, Bernhard Dieber, and Bernhard Rinner, “Resilient Self-Calibration in Distributed Visual Sensor Networks,” 2019 15th International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 271–278, . View at Publisher · View at Google Scholar
  • Peng-Fei Wu, Hai-Ping Huang, Ru-Chuan Wang, Nai-Xue Xiong, Fu Xiao, and Chao Sha, “Node scheduling strategies for achieving full-view area coverage in camera sensor networks,” Sensors (Switzerland), vol. 17, no. 6, 2017. View at Publisher · View at Google Scholar
  • Tarunpreet Bhatia, Gaurav Sharma, Gulshan Shrivastava, and Arzoo Miglani, “An energy efficient and trust aware framework for secure routing in leach for wireless sensor networks,” Scalable Computing, vol. 18, no. 3, pp. 207–218, 2017. View at Publisher · View at Google Scholar
  • Lijuan Sun, Chong Han, Jian Guo, and Ying Cao, “Improved side information generation algorithm based on naive Bayesian theory for distributed video coding,” IET Image Processing, vol. 12, no. 3, pp. 354–360, 2018. View at Publisher · View at Google Scholar
  • Yujie Zhang, Ruchuan Wang, Weibei Fan, and Zhije Han, “Method of Maintaining Data Consistency in Microservice Architecture,” Proceedings - 4th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2018, 4th IEEE International Conference on High Performance and Smart Computing, HPSC 2018 and 3rd IEEE International Conference on Intelligent Data and Security, IDS 2018, pp. 47–50, 2018. View at Publisher · View at Google Scholar
  • Weibei Fan, Ruchuan Wang, Zhije Han, and Yujie Zhang, “A Locality Live Migration Strategy Based on Docker Containers,” Proceedings - 4th IEEE International Conference on Big Data Security on Cloud, BigDataSecurity 2018, 4th IEEE International Conference on High Performance and Smart Computing, HPSC 2018 and 3rd IEEE International Conference on Intelligent Data and Security, IDS 2018, pp. 51–54, 2018. View at Publisher · View at Google Scholar
  • Yu Xue, Weiwei Jia, Xuejian Zhao, and Wei Pang, “An Evolutionary Computation Based Feature Selection Method for Intrusion Detection,” Security and Communication Networks, vol. 2018, pp. 1–10, 2018. View at Publisher · View at Google Scholar
  • Shanshan Li, “Wireless sensor network node deployment based on multi-objective immune algorithm,” International Journal of Internet Protocol Technology, vol. 11, no. 1, pp. 12–18, 2018. View at Publisher · View at Google Scholar
  • Rafina Destiarti, Prima Kristalina, and Amang Sudarsono, “SWOT: Secure wireless object tracking with key renewal mechanism for indoor wireless sensor network,” International Journal on Advanced Science, Engineering and Information Technology, vol. 8, no. 2, pp. 520–531, 2018. View at Publisher · View at Google Scholar
  • Bin Yu, and Meigen Huang, “SDN-based secure localization in heterogeneous WSN,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10631, pp. 276–287, 2018. View at Publisher · View at Google Scholar
  • Pavel G. Baranov, Hans Jürgen von Bardeleben, Fedor Jelezko, Jörg Wrachtrup, Yu Shi, Hua Liu, Weiyu Zhang, Yong Wei, and Jinfeng Dong, “Research on Three-Dimensional Localization Algorithm for WSN Based on RSSI,” Magnetic Resonance of Semiconductors and Their Nanostructures, vol. 253, pp. 1048–1055, 2019. View at Publisher · View at Google Scholar