Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 480202, 11 pages
http://dx.doi.org/10.1155/2014/480202
Research Article

Fuzzy-Based Trust Prediction Model for Routing in WSNs

1Department of ECE, Anna University, Chennai 600025, India
2Department of ECE, St. Joseph’s College of Engineering, Chennai 600119, India

Received 14 March 2014; Revised 15 June 2014; Accepted 17 June 2014; Published 14 July 2014

Academic Editor: Fei Yu

Copyright © 2014 X. Anita et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. E. Fontana, J. F. Martins-Filho, S. C. Oliveira et al., “Sensor network for monitoring the state of pollution of high-voltage insulators via satellite,” IEEE Transactions on Power Delivery, vol. 27, no. 2, pp. 953–962, 2012. View at Publisher · View at Google Scholar · View at Scopus
  2. J. Valverde, V. Rosello, G. Mujica, J. Portilla, A. Uriarte, and T. Riesgo, “Wireless sensor network for environmental monitoring: application in a coffee factory,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 638067, 18 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Wu and S. Shimamoto, “Usage control based security access scheme for wireless sensor networks,” in Proceedings of the IEEE International Conference on Communications (ICC '10), pp. 1–5, May 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. T. Watteyne and K. S. J. Pister, “Smarter cities through standards-based wireless sensor networks,” IBM Journal of Research and Development, vol. 55, no. 1-2, pp. 7–10, 2011. View at Publisher · View at Google Scholar · View at Scopus
  5. Y. Cao, C. Xu, J. Guan, F. Song, and H. Zhang, “Environment-aware CMT for efficient video delivery in wireless multimedia sensor networks,” International Journal of Distributed Sensor Networks, vol. 2012, Article ID 381726, 12 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  6. X. Chen, K. Makki, K. Yen, and N. Pissinou, “Sensor network security: a survey,” IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 52–73, 2009. View at Publisher · View at Google Scholar · View at Scopus
  7. Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Communication Surveys and Tutorials, vol. 8, no. 2, pp. 2–23, 2006. View at Google Scholar
  8. J. Duan, Y. Dong, H. Zhu, S. Zhang, and J. Zhao, “TSRF: a trust-aware secure routing framework in wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2014, Article ID 209436, 14 pages, 2014. View at Publisher · View at Google Scholar
  9. S. Paris, C. Nita-Rotaru, and F. Martignon, “EFW: a cross-layer metric for reliable routing in wireless mesh networks with selfish participants,” in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM '11), pp. 576–580, 2011.
  10. M. Mohi, A. Movaghar, and P. M. Zadeh, “A bayesian game approach for preventing DoS attacks in wireless sensor networks,” in Proceeding of the WRI International Conference on Communications and Mobile Computing, (CMC '09), pp. 507–511, Yunnan, China, January 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. C. Balarengadurai and S. Saraswathi, “Fuzzy based detection and prediction of DDoS attacks in IEEE 802.15.4 low rate wireless personal area network,” International Journal of Computer Science Issues, vol. 10, no. 6, pp. 293–301, 2013. View at Google Scholar
  12. R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, S. Lee, and Y. Song, “Group-based trust management scheme for clustered wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 20, no. 11, pp. 1698–1712, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. T. Zahariadis, P. Trakadas, H. C. Leligou, S. Maniatis, and P. Karkazis, “A novel trust-aware geographical routing scheme for wireless sensor networks,” Wireless Personal Communications, vol. 69, no. 2, pp. 805–826, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. X. Li, F. Zhou, and J. Du, “LDTS: a lightweight and dependable trust system for clustered wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 6, pp. 924–935, 2013. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Xia, Z. Jia, X. Li, L. Ju, and E. H.-M. Sha, “Trust prediction and trust-based source routing in mobile ad hoc networks,” Ad Hoc Networks, vol. 11, no. 7, pp. 2096–2114, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. H. Xia, Z. Jia, L. Ju, X. Li, and E. H.-M. Sha, “Impact of trust model on on-demand multi-path routing in mobile ad hoc networks,” Computer Communications, vol. 36, no. 9, pp. 1078–1093, 2013. View at Publisher · View at Google Scholar · View at Scopus
  17. X. Anita, J. Martin Leo Manickam, and M. A. Bhagyaveni, “Two-way acknowledgment-based trust framework for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2013, Article ID 952905, 14 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  18. A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler, “SPINS: security protocols for sensor networks,” Wireless Networks, vol. 8, no. 5, pp. 521–534, 2002. View at Publisher · View at Google Scholar · View at Scopus
  19. S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), pp. 62–72, October 2003. View at Scopus
  20. H. Chan, A. Perrig, and D. Song, “Random key predistribution schemes for sensor networks,” in Proceedings of the IEEE Symposium on Security And Privacy, pp. 197–213, May 2003. View at Scopus
  21. C. Karlof, N. Sastry, and D. Wagner, “TinySec: a link layer security architecture for wireless sensor networks,” in Proceedings of the Second International Conference on Embedded Networked Sensor Systems (SenSys '04), pp. 162–175, November 2004. View at Scopus
  22. D. J. Rumsey, Statistics For Dummies, John Wiley & Sons, 2nd edition, 2011.
  23. C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings of the 2nd IEEE Workshop on Mobile Computing, Systems and Applications (WMCSA '99), pp. 90–100, New Orleans, La, USA, February 1999. View at Publisher · View at Google Scholar · View at Scopus