

A Two -Way Trust Assurance of Aggregator Node for Ensuring Data Reliability in Wireless Sensor Networks
Abstract
Keywords
References
N. Chitradevi, V.Palanisamy, K. Baskaran D.Aswini and, “Secure Trust Based Power-Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Network,” Proc. 2nd International Conference on IISM'11, 2011.
W. Du, J. Deng, Y.S. Han, and P.K. Varshney, “A Witness-Based Approach for Data Fusion Assurance in Wireless Sensor Networks,” Proc. IEEE Global Telecomm. Conf., vol. 3, pp. 1435- 1439, etc. 2003.
Hung-Ta Pai, S. Han “Power Efficient Direct-Voting Assurance for Data Fusion in Wireless Sensor Networks” IEEE Journal, vol.57, Feb. 2008.
J. Deng, R. Han, and S. Mishra, “A Performance Evaluation of Intrusion-Tolerant Routing in Wireless Sensor Networks,” Proc. Int’l Workshop Information Processing in Sensor Networks, pp. 349-364, 2003.
D. Culler, D. Estrin, and M. Srivastava, “Overview of Sensor Networks,” Computer, vol. 37, no. 8, pp. 41-49, Aug. 2004.
T.Liqin, L.Chuang, “Computation and Analysis of Node Intending Trust in WSNs”, IEEE Conference, 2000.
A. D’Costa, V. Ramachandran, and A.M. Sayeed, “Distributed Classification of Gaussian Space-Time Sources in Wireless Sensor
Networks,” IEEE J. Selected Areas Comm., vol. 22, no. 6, pp. 1026-1036, Aug. 2004.
D. Wagner, “Resilient Aggregation in Sensor Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, pp. 78-87, Oct. 2004.
T.-Y. Wang, Y.S. Han, B. Chen, and P.K. Varshney, “A Combined Decision Fusion and Channel Coding Scheme for Distributed Fault-Tolerant Classification in Wireless Sensor Networks,” IEEE Trans. Wireless Comm., 2006.
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Survey on Sensor Networks,” IEEE Comm. Magazine, vol. 38, no. 8, pp. 102-114, Aug. 2002.
J. Lopez. Unleashing public-key cryptography in wireless sensor networks. J. Comput. Secur., 14(5):469–482, 2006.
R. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus. Tinypk: securing sensor networks with public key technology. In SASN ’04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 59–64, New York, NY, USA,2004. ACM.
D. C. Montgomery and G. C. Runger. Applied Statistics and Probability for Engineers. WILEY, 2006.
A. Josang and R. Ismail. The beta reputation system. In 15th Bled Electronic Commerce Conference, 2002.
C. J. C. H. Watkins and P. D. Dayan. Q-learning. Machine Learning, 3:279 – 292, 1992.
Oly Mistry, Anıl Gürsel, Sandip Sen, “Comparing Trust Mechanisms for Monitoring Aggregator Nodes in Sensor Networks”. Proc. AAMAS’ 09 8th international conferences on Autonomous Agents and Multiagent Systems, vol.2, 2009.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.