Have a personal or library account? Click to login

Seladg: Secure Energy Efficient Location Aware Data Gathering Approach for Wireless Sensor Networks

Open Access
|Sep 2015

References

  1. S. Yoo, S.-h. Kang, and J. Kim, “SERA: a secure energy reliability aware data gathering for sensor networks,”Multimedia Tools and Applications, pp. 1-30, 2011/01/29 2011.
  2. Y. M. Zhou and L. Y. Li, “A Trust-Aware and Location-Based Secure Routing Protocol for WSN,”Applied Mechanics and Materials, vol. 373, pp. 1931-1934, 2013.
  3. E. Ahvar, A. Pourmoslemi, and M. J. Piran, “Fear: A Fuzzy-based Energy-aware Routing Protocol for Wireless Sensor Networks,”arXiv preprint arXiv:1108.2777,2011.
  4. J. Bahi, C. Guyeux, and A. Makhoul, “Secure Data Aggregation in Wireless Sensor Networks: Homomorphism versus Watermarking Approach,” in Ad Hoc Networks. vol. 49, J. Zheng, D. Simplot-Ryl, and V. M. Leung, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 344-358.
  5. A. T. Boloorchi and M. H. Samadzadeh, “Energy-efficient and secure in-network storage and retrieval for WSNs: an adaptive approach,”The Journal of Supercomputing, vol. 65, pp. 961-977, 2013/08/01 2013.10.1007/s11227-013-0874-2
  6. W. Jin, C. Jinsung, L. Sungyoung, C. Kwang-Cheng, and L. Young-Koo, “Hop-based energy aware routing algorithm for wireless sensor networks,”IEICE transactions on communications, vol. 93, pp. 305-316, 2010.10.1587/transcom.E93.B.305
  7. V. Kumar and S. Madria, “Secure Data Aggregation in Wireless Sensor Networks,” in Wireless Sensor Network Technologies for the Information Explosion Era. vol. 278, T. Hara, V. Zadorozhny, and E. Buchmann, Eds., ed: Springer Berlin Heidelberg, 2010, pp. 77-107.10.1007/978-3-642-13965-9_3
  8. C. Ranhotigamage and S. C. Mukhopadhyay, “Field Trials and Performance Monitoring of Distributed Solar Panels Using a Low Cost Wireless Sensors Network for Domestic Applications”, IEEE Sensors Journal, Vol. 11, No. 10, October 2011, pp. 2583-2590.10.1109/JSEN.2011.2150214
  9. B. Kumari, N. Vikram, and M. M. Reddy, “Secure Data Collection in Wireless Sensor Networks Using Random Routing Algorithms,”International Journal of Computer Science and Telecommunications, vol. 2, pp. 50-55, 2011.
  10. H. Li, K. Li, W. Qu, and I. Stojmenovic, “Secure and Energy-Efficient Data Aggregation with Malicious Aggregator Identification in Wireless Sensor Networks,” in Algorithms and Architectures for Parallel Processing. vol. 7016, Y. Xiang, A. Cuzzocrea, M. Hobbs, and W. Zhou, Eds., ed: Springer Berlin Heidelberg, 2011, pp. 2-13.
  11. W. Lu, Y. Liu, and D. Wang, “A Distributed Secure Data Collection Scheme via Chaotic Compressed Sensing in Wireless Sensor Networks,”Circuits, Systems, and Signal Processing, vol. 32, pp. 1363-1387, 2013/06/01 2013.
  12. P. Samundiswary, M. P. Kumar, and P. Dananjayan, “Trust Based Energy Aware Greedy Perimeter Stateless Routing for Wireless Sensor Networks,”Journal of Communication and Computer, vol. 8, pp. 848-854, 2011.
  13. T. Zahariadis, P. Trakadas, H. C. Leligou, S. Maniatis, and P. Karkazis, “A novel trust-aware geographical routing scheme for wireless sensor networks,”Wireless personal communications, vol. 69, pp. 805-826, 2013.10.1007/s11277-012-0613-7
  14. H.-C. Leligou, P. Trakadas, S. Maniatis, P. Karkazis, and T. Zahariadis, “Combining trust with location information for routing in wireless sensor networks,”Wireless Communications and Mobile Computing, vol. 12, pp. 1091-1103, 2012.
  15. G. Zhan, W. Shi, and J. Deng, “Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs,”Dependable and Secure Computing, IEEE Transactions on, vol. 9, pp. 184-197, 2012.10.1109/TDSC.2011.58
  16. G. V. Crosby, L. Hester, and N. Pissinou, “Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks,”IJ Network Security,vol. 12, pp. 107-117, 2011.
  17. R. Feng, X. Xu, X. Zhou, and J. Wan, “A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory,”Sensors, vol. 11, pp. 1345-1360, 2011.
  18. H. Zhao, Y. Li, M. Zhang, R. Zheng, and Q. Wu, “A New Secure Geographical Routing Protocol Based on Location Pairwise Keys in Wireless Sensor Networks,”International Journal of Computer Science Issues (IJCSI), vol. 10, 2013.
  19. J. Duan, D. Yang, H. Zhu, S. Zhang, and J. Zhao, “TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks,”International Journal of Distributed Sensor Networks, vol. 2014, 2014.10.1155/2014/209436
  20. Y. Mao, “A secure mechanism for data collection in wireless sensor networks,”Applied Mathematics& Information Sciences, vol. 5, pp. 97-103, 2011.
  21. S.-I. Huang, S. Shieh, and J. Tygar, “Secure encrypted-data aggregation for wireless sensor networks,”Wireless Networks, vol. 16, pp. 915-927, 2010.10.1007/s11276-009-0177-y
  22. L. A. Villas, A. Boukerche, H. A. De Oliveira, R. B. De Araujo, and A. A. Loureiro, “A spatial correlation aware algorithm to perform efficient data collection in wireless sensor networks,”Ad Hoc Networks, vol. 12, pp. 69-85, 2014.10.1016/j.adhoc.2011.08.005
  23. S. Xiao, B. Li, and X. Yuan, “Maximizing precision for energy-efficient data aggregation in wireless sensor networks with lossy links,”Ad Hoc Networks, vol. 26, pp. 103-113, 2015.10.1016/j.adhoc.2014.11.014
  24. K. Yi, J. Wan, L. Yao, and T. Bao, “Partial Matrix Completion Algorithm for Efficient Data Gathering in Wireless Sensor Networks,”IEEE Communications Letters,, vol. 19, pp. 54-57, 2015.10.1109/LCOMM.2014.2371998
  25. M. Naznin and A. S. Chowdhury, “ZDG: Energy efficient zone based data gathering in a wireless sensor network,” in International Conference on Networking Systems and Security (NSysS), 2015, pp. 1-7.10.1109/NSysS.2015.7043514
  26. B. Wu, Y. Feng, and H. Zheng, “POSTERIOR BELIEF CLUSTERING ALGORITHM FOR ENERGY-EFFICIENT TRACKING IN WIRELESS SENSOR NETWORKS,”International Journal on Smart Sensing and Intelligent Systems, vol. 7, pp. 925-941, 2014.10.21307/ijssis-2017-688
  27. X. Zhao, J. Minz, and S. K. Lim, “Low-power and reliable clock network design for through-silicon via (TSV) based 3D ICs,”IEEE Transactions on Components, Packaging and Manufacturing Technology, vol. 1, pp. 247-259, 2011.10.1109/TCPMT.2010.2099590
  28. H. Wenbo, L. Xue, N. Hoang, K. Nahrstedt, and T. Abdelzaher, “PDA: PrivacyPreserving Data Aggregation in Wireless Sensor Networks,” in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, 2007, pp. 20452053.
Language: English
Page range: 1748 - 1767
Submitted on: Apr 12, 2015
Accepted on: Aug 10, 2015
Published on: Sep 1, 2015
Published by: Professor Subhas Chandra Mukhopadhyay
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year

© 2015 M. Roseline Juliana, S. Srinivasan, published by Professor Subhas Chandra Mukhopadhyay
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.