- [1] Bhuiyan, M.Z.A., et al., “Dependable structural health monitoring using wireless sensor networks,” IEEE Transactions on Dependable and Secure Computing, Vol. 14(4), pp. 363-376, 2015.
- [2] Alam, M.M., D.B. Arbia, and E.B. “Hamida, Wearable wireless sensor networks for emergency response in public safety networks,” in Wireless Public Safety Networks 2., Elsevier. pp. 63-94, 2016.
- [3] Ojha, T., S. Misra, and N.S. Raghuwanshi,” Wireless sensor networks for agriculture: The state-of-the-art in practice and future challenges,” Computers and Electronics in Agriculture, Vol. 118: pp. 66-84, 2015.
- [4] Gomes, R.D., et al., “Application of Wireless Sensor Networks Technology for Induction Motor Monitoring in Industrial Environments,” in Intelligent Environmental Sensing., Springer. 227-277, 2015.
- [5] Kuorilehto, M., M. Hännikäinen, and T.D. Hämäläinen, “A survey of application distribution in wireless sensor networks”, EURASIP Journal on Wireless Communications and Networking, Vol. 2005(5), pp. 859712, 2005.
- [6] Almudevar, A., A. Leibovici, and Horwitz. “Electronic motion monitoring in the assessment of non-cognitive symptoms of dementia,” 2005. INTERNATIONAL CONGRESS OF THE INTERNATIONAL PSYCHOGERIATRIC ASSOCIATION.
- [7] Nurmi, P., et al.”A Framework for Distributed Activity Recognition in Ubiquitous Systems,” in IC-AI. 2005.
- [8] Jafari, R., et al. “Wireless sensor networks for health monitoring,” In the Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services. 2005. IEEE.
- [9] Butun, I., S.D. Morgera, and R. Sankar, “A survey of intrusion detection systems in wireless sensor networks,” IEEE communications surveys & tutorials, 16(1), pp. 266-282, 2013.
- [10] Shaikh, R.A., et al. “LSec: lightweight security protocol for distributed wireless sensor network,” in IFIP International Conference on Personal Wireless Communications. 2006. Springer.
- [11] Perrig, A., and et al., SPINS: “Security protocols for sensor networks. Wireless networks,", Vol. 8(5), pp. 521-534, 2002.
- [12] Karlof, C. “Secure routing in sensor networks: Attacks and countermeasures,” in Proc. of 1st IEEE International Workshop on Sensor Network Protocols and Applications (SNPA2003). 2003.
- [13] Boukerch, A., L. Xu, and K. El-Khatib, “Trust-based security for wireless ad hoc and sensor networks,” Computer Communications, Vol. 30(11-12), pp. 2413-2427, 2007.
- [14] Lacuesta, R., et al., “A secure protocol for spontaneous wireless ad hoc networks creation,” IEEE transactions on parallel and distributed systems, Vol. 24(4), pp. 629-641, 2012.
- [15] Liu, Y., C.-x. Liu, and Q.-A. Zeng, “Improved trust management based on the strength of ties for secure data aggregation in wireless sensor networks Telecommunication Systems,” Vol. 62(2), pp. 319-325, 2016.
- [16] Anita, X., M.A. Bhagyaveni, and J.M.L.” Manickam, Collaborative lightweight trust management scheme for wireless sensor networks,” Wireless Personal Communications, Vol. 80(1), pp. 117-140, 2015.
- [17] Rajeshkumar, G. and K. Valluvan, “An energy aware trust based intrusion detection system with adaptive acknowledgement for wireless sensor network,” Wireless Personal Communications, Vol. 94(4), pp. 1993-2007, 2017.
- [18] Narendra, K.S. and M.A. Thathachar, “Learning automata-a survey,” IEEE Transactions on systems, man, and cybernetics, 1974(4), pp. 323-334.
- [19] Ganeriwal, S., L.K. Balzano, and M.B. Srivastava, “Reputation-based framework for high integrity sensor networks,” ACM Transactions on Sensor Networks (TOSN), 4(3), pp. 15, 2008.
- [20] Eissa, T., et al., “Trust-based routing mechanism in MANET: Design and implementation,” Mobile Networks and Applications, Vol. 18(5): p. 666-6, 2013.
- [21] Song, J., et al. “Dynamic trust evaluation of wireless sensor networks based on multi-factor,” in 2015 IEEE Trustcom/BigDataSE/ISPA. 2015. IEEE.
- [22] Ahmed, A., et al., “A trust aware routing protocol for energy constrained wireless sensor network,” Telecommunication Systems, Vol. 61(1), pp. 123-140, 2016.
- [23] Ahmed, A., et al., “A secure routing protocol with trust and energy awareness for wireless sensor network,” Mobile Networks and Applications, Vol. 21(2), pp. 272-285, 2016.
- [24] Ahmed, A., et al., “Energy-aware and secure routing with trust for disaster response wireless sensor network,” Peer-to-Peer Networking and Applications, Vol. 10(1), pp. 216-237, 2017.
- [25] Marchang, N. and R. Datta, “Light-weight trust-based routing protocol for mobile ad hoc networks,” IET information security, Vol. 6(2), pp. 77-83, 2012.
- [26] Channa, M.I. and K.M. Ahmed, “A Reliable Routing Scheme for Post-Disaster Ad Hoc Communication Networks,” JCM, Vol. 6(7), pp. 549-557, 2011.
- [27] Fang, W., et al., “BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks,” Journal of Network and Computer Applications, Vol. 59, pp. 88-94, 2016.
- [28] Li, Y. and L.E. Parker. “Intruder detection using a wireless sensor network with an intelligent mobile robot response,” in IEEE SoutheastCon 2008, 2008. IEEE.
- [29] Jiang, J., et al., “An efficient distributed trust model for wireless sensor networks,” IEEE transactions on parallel and distributed systems, Vol. 26(5), pp. 1228-1237, 2014.
- [30] Marzi, H. and M. Li, “An enhanced bio-inspired trust and reputation model for wireless sensor network,” Procedia Computer Science, Vol. 19, pp. 1159-1166, 2013.
- [31] Chowdhury, A.R., S. Tripathy, and S. Nandi. “Securing wireless sensor networks against spurious injections,” in 2007 2nd International Conference on Communication Systems Software and Middleware. 2007. IEEE.
- [32] Junnarkar, A. and A. Bagwan. “Novel Quality of Service (QOS) Improvement Routing Protocol for MANET Using Ant Colony Optimization,” in 2017 International Conference on Computing, Communication, Control and Automation (ICCUBEA). 2017. IEEE.
- [33] Misra, S., et al.,” LAID: a learning automata‐based scheme for intrusion detection in wireless sensor networks,” Security and Communication Networks, 2(2), pp. 105-115, 2009.
- [34] Das, S.K., P.S. Chatterjee, and M. Roy, “Detecting and Punishing the Selfish Node and Its Behavior in WSN,” International Journal of Computer & Organization Trends, Vol. 6(1), 2014.
- [35] Prithi, S. and S. Sumathi, “LD2FA-PSO: A novel Learning Dynamic Deterministic Finite Automata with PSO algorithm for secured energy efficient routing in Wireless Sensor Network,” Ad Hoc Networks, 2020. 97: p. 102024.
- [36] Zhan, G., W. Shi, and J. Deng, “Design and implementation of TARF: A trust-aware routing framework for WSNs,” IEEE Transactions on dependable and secure computing, Vol. 9, pp. 184-197, 2011.
- [37] Pirzada, A.A. and C. McDonald. “Trusted greedy perimeter stateless routing,” in 2007 15th IEEE International Conference on Networks. IEEE.
- [38] Narendra, K.S. and M.A. Thathachar, ”Learning automata: an introduction,”, Courier corporation, 2012.
- [39] Misra, S., P.V. Krishna, and K.I. Abraham, “A simple learning automata‐based solution for intrusion detection in wireless sensor networks,” Wireless Communications and Mobile Computing, Vol. 11(3), pp. 426-441, 2011.
|