SPINS: security protocols for sensor networks
Wireless Networks
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
Denial of Service in Sensor Networks
Computer
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Random Key Predistribution Schemes for Sensor Networks
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Establishing pairwise keys in distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Maximizing the functional lifetime of sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Energy optimal data propagation in wireless sensor networks
Journal of Parallel and Distributed Computing
Energy balanced data propagation in wireless sensor networks
Wireless Networks
Analytical modeling and mitigation techniques for the energy hole problem in sensor networks
Pervasive and Mobile Computing
Mobile agent-based directed diffusion in wireless sensor networks
EURASIP Journal on Applied Signal Processing
Directional geographical routing for real-time video communications in wireless sensor networks
Computer Communications
Distributed algorithms for secure multipath routing in attack-resistant networks
IEEE/ACM Transactions on Networking (TON)
Receiver-oriented load-balancing and reliable routing in wireless sensor networks
Wireless Communications & Mobile Computing - Distributed Systems of Sensors and Actuators
Energy-efficient differentiated directed diffusion (EDDD) in wireless sensor networks
Computer Communications
Directional Controlled Fusion in Wireless Sensor Networks
Mobile Networks and Applications
A mission-impact-based approach to INFOSEC alarm correlation
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Routing for disruption tolerant networks: taxonomy and design
Wireless Networks
Adaptive reliable routing based on cluster hierarchy for wireless multimedia sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
Applications and design issues for mobile agents in wireless sensor networks
IEEE Wireless Communications
Statistical en-route filtering of injected false data in sensor networks
IEEE Journal on Selected Areas in Communications
Location-based compromise-tolerant security mechanisms for wireless sensor networks
IEEE Journal on Selected Areas in Communications
Energy-efficient beaconless geographic routing in energy harvested wireless sensor networks
Concurrency and Computation: Practice & Experience
Denial of service mitigation approach for IPv6-enabled smart object networks
Concurrency and Computation: Practice & Experience
Hi-index | 0.00 |
For the energy limited wireless sensor networks, the critical problem is how to achieve the energy efficiency. Many attackers can consume the limited network energy, by the method of capturing some legal nodes then control them to start DoS and flooding attack, which is difficult to be detected by only the classic cryptography based techniques with common routing protocols in wireless sensor networks (WSNs). We argue that under the condition of attacking, existing routing schemes are low energy-efficient and vulnerable to inside attack due to their deterministic nature. To avoid the energy consumption caused by the inside attack initiated by the malicious nodes, this paper proposes a novel energy efficiency routing with node compromised resistance (EENC) based on Ant Colony Optimization. Under our design, each node computes the trust value of its 1-hop neighbors based on their multiple behavior attributes evaluation and builds a trust management by the trust value. By this way, sensor nodes act as router to achieve dynamic and adaptive routing, where the node can select much energy efficiency and faithful forwarding node from its neighbors according to their remaining energy and trust values in the next process of data collection. Simulation results indicate that the established routing can bypass most compromised nodes in the transmission path and EENC has high performance in energy efficiency, which can prolong the network lifetime.