Asian Journal of Information Technology

Year: 2013
Volume: 12
Issue: 7
Page No. 208 - 216

A Secure and Fault-Tolerant Routing Protocol Based on GDDA and HLUA

Authors : A. Gopi Saminathan and S. Karthik

References

Ba, M., I. Niang, B. Gueye and T. Noel, 2010. A deterministic key management scheme for securing cluster-based sensors networks. Proceedings of the 8th International Conference on Embedded and Ubiquitous Computing, December 11-13, 2010, Hong Kong, pp: 422-427.

Bagaa, M., Y. Challal, A. Ouadjaout, N. Lasla and N. Badache, 2012. Efficient data aggregation with in-network integrity control for WSN. J. Parallel Distrib. Comput., 72: 1157-1170.
CrossRef  |  Direct Link  |  

Bo, S., X. Shan, K. Wu and Y. Xiao, 2013. Anomaly detection based secure in-network aggregation for wireless sensor networks. IEEE Syst. J., 7: 13-25.
CrossRef  |  Direct Link  |  

De Dieu, I.J., N. Assouma, M. Muhamad, W. Jin and S. Lee, 2012. Energy-efficient secure path algorithm for wireless sensor networks. Int. J. Distrib. Sensor Networks, Vol. 2012. 10.1155/2012/751784

Fukabori, T., H. Nakayama, H. Nishiyama, N. Ansari and N. Kato, 2010. An Efficient data aggregation scheme using degree of dependence on clusters in WSNs. Proceedings of the IEEE International Conference on Communications, May 23-27, 2010, Cape Town, pp: 1-5.

Harjito, B., S. Han, V. Potdar, E. Chang and M. Xie, 2010. Secure communication in wireless multimedia sensor networks using watermarking. Proceedings of the 4th IEEE International Conference on Digital Ecosystems and Technologies, April 13-16, 2010, Dubai, pp: 640-645.

Hong, S.H., J.M. Park and J.M. Gil, 2013. Performance evaluation of a simple cluster-based aggregation and routing in wireless sensor networks. Int. J. Distrib. Sensor Networks, Vol. 2013. 10.1155/2013/501594

Huang, L., J. Li and H. Kameda, 2010. A secure routing protocol for cluster-based wireless sensor networks using ID-based digital signature. Proceedings of the IEEE Global Telecommunications Conference, December 6-10, 2010, Miami, FL., USA., pp: 1-5.

Huang, S.I., S. Shieh and J.D. Tygar, 2010. Secure encrypted-data aggregation for wireless sensor networks. Wireless Networks, 16: 915-927.
CrossRef  |  Direct Link  |  

Lei, Z., H. Zhang, M. Conti, R. di Pietro, S. Jajodia and L.V. Mancini, 2010. Reverse tree-based key routing: Robust data aggregation in wireless sensor networks. Proceedings of the 10th International Conference on Computer and Information Technology, June 29-July-1, 2010, Bradford, pp: 910-915.

Lin, X., R. Lu and X. Shen, 2010. MDPA: Multidimensional privacy-preserving aggregation scheme for wireless sensor networks. Wireless Commun. Mobile Comput., 10: 843-856.
CrossRef  |  Direct Link  |  

Mpitziopoulos, A., D. Gavalas, C. Konstantopoulos and G. Pantziou, 2010. CBID: A scalable method for distributed data aggregation in WSNs. Int. J. Distrib. Sensor Networks, 10.1155/2010/206517

Ozdemir, S. and H. Cam, 2010. Integration of false data detection with data aggregation and confidential transmission in wireless sensor networks. IEEE/ACM Trans. Network, 18: 736-749.
CrossRef  |  Direct Link  |  

Ozdemir, S. and Y. Xiao, 2011. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks. Comput. Networks, 55: 1735-1746.
CrossRef  |  Direct Link  |  

Sicari, S., L.A. Grieco, G. Boggia and A. Coen-Porisini, 2012. DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. J. Syst. Software, 85: 152-166.
CrossRef  |  Direct Link  |  

Su, T.S., M.W. Huang, W.S. Li and W.S. Hsieh, 2012. Aggregation scheme with secure hierarchical clustering for wireless sensor networks. Int. J. Distrib. Sensor Networks, Vol. 2012. 10.1155/2012/162347

Wang, J., L. Zheng, L. Zhao and D. Tian, 2012. LEACH-based security routing protocol for WSNs. Adv. Comput. Sci. Inform. Eng., 169: 253-258.
CrossRef  |  Direct Link  |  

Yang, G., S. Li, X. Xu, H. Dai and Z. Yang, 2013. Precision-enhanced and encryption-mixed privacy-preserving data aggregation in wireless sensor networks. Int. J. Distrib. Sensor Networks, Vol. 2013. 10.1155/2013/427275

Zhu, L., Z. Yang, M. Wang and M. Li, 2013. ID list forwarding free confidentiality preserving data aggregation for wireless sensor networks. Int. J. Distrib. Sensor Networks, Vol. 2013. 10.1155/2013/241261

Zhu, W.T., F. Gao and Y. Xiang, 2011. A secure and efficient data aggregation scheme for wireless sensor networks. Concurrency Comput.: Pract. Exp., 23: 1414-1430.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved