Trust Based DoS Attack Detection in Wireless Sensor Networks for Reliable Data Transmission (original) (raw)
References
Liu, X., Jiguo, Yu., Li, F., Lv, W., Wang, Y., & Cheng, X. (2020). Data aggregation in wireless sensor networks: From the perspective of security. IEEE Internet of Things Journal,7(7), 6495–6513. Article Google Scholar
Xie, H., Yan, Z., Yao, Z., & Atiquzzaman, M. (2019). Data collection for security measurement in wireless sensor networks: A survey. IEEE Internet of Things Journal,6(2), 2205–2224. Article Google Scholar
Tomić, I., & McCann, J. A. (2017). A survey of potential security issues in existing wireless sensor network protocols. IEEE Internet of Things Journal,4(6), 1910–1923. Article Google Scholar
Osanaiye, O. A., Alfa, A. S., & Hancke, G. P. (2018). Denial of service defence for resource availability in wireless sensor networks. IEEE Access,6, 6975–7004. Article Google Scholar
Smys, S. (2019). DDoS attack detection in telecommunication network using machine learning. Journal of Ubiquitous Computing and Communication Technologies,1(01), 33–44. Article Google Scholar
Luo, X., Chen, Y., Li, M., Luo, Q., Xue, K., Liu, S., & Chen, L. (2019). CREDND: A novel secure neighbor discovery algorithm for wormhole attack. IEEE Access,7, 18194–18205. Article Google Scholar
Ahutu, O. R., & El-Ocla, H. (2020). Centralized routing protocol for detecting wormhole attacks in wireless sensor networks. IEEE Access,8, 63270–63282. Article Google Scholar
Ren, J., Zhang, Y., Zhang, K., & Shen, X. (2016). Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks. IEEE Transactions on Wireless Communications,15(5), 3718–3731. Article Google Scholar
Li, Y., & Wu, Y. (2020). Combine clustering with game to resist selective forwarding in wireless sensor networks. IEEE Access,8, 138382–138395. Article Google Scholar
Ding, J., Zhang, H., Guo, Z., & Wu, Y. (2021). The DPC-based scheme for detecting selective forwarding in clustered wireless sensor networks. IEEE Access,9, 20954–20967. Article Google Scholar
Smys, S., & Vijesh Joe, C. (2021). Metric routing protocol for detecting untrustworthy nodes for packet transmission. Journal of Information Technology,3(02), 67–76. Google Scholar
Chen, H., Meng, C., Shan, Z., Fu, Z., & Bhargava, B. K. (2019). A novel low-rate denial of service attack detection approach in ZigBee wireless sensor network by combining Hilbert–Huang transformation and trust evaluation. IEEE Access,7, 32853–32866. Article Google Scholar
Vashist, A., Keats, A., Dinakarrao, S. M. P., & Ganguly, A. (2019). Securing a wireless network-on-chip against jamming-based denial-of-service and eavesdropping attacks. IEEE Transactions on Very Large-Scale Integration (VLSI) Systems,27(12), 2781–2791. Article Google Scholar
Mugunthan, S. R. (2021). Wireless rechargeable sensor network fault modeling and stability analysis. Journal of Soft Computing Paradigm (JSCP),3(01), 47–54. Article Google Scholar
Gope, P., Lee, J., & Quek, T. Q. S. (2017). Resilience of DoS attacks in designing anonymous user authentication protocol for wireless sensor networks. IEEE Sensors Journal,17(2), 498–503. Article Google Scholar
Lyu, C., Zhang, X., Liu, Z., & Chi, C.-H. (2019). Selective authentication based geographic opportunistic routing in wireless sensor networks for internet of things against DoS attacks. IEEE Access,7, 31068–31082. Article Google Scholar
Jeena, J. I., & Darney, P. E. (2021). Artificial bee colony optimization algorithm for enhancing routing in wireless networks. Journal of Artificial Intelligence,3(01), 62–71. Google Scholar
Teng, Z., Pang, B., Du, C., & Li, Z. (2020). Malicious node identification strategy with environmental parameters. IEEE Access,8, 149522–149530. Article Google Scholar
Jinhui, X., Yang, T., Feiyue, Y., Pan Leina, Xu., & Juan, H. Y. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia Computer Science,131, 1188–1195. Article Google Scholar
Smys, S., Bashar, A., & Haoxiang, W. (2021). Taxonomy classification and comparison of routing protocol based on energy efficient rate. Journal of ISMAC,3(02), 96–110. Google Scholar
Zhao, J., Huang, J., & Xiong, N. (2019). An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access,7, 33859–33869. Article Google Scholar
Sun, B., & Li, D. (2018). A comprehensive trust-aware routing protocol with multi-attributes for WSNs. IEEE Access,6, 4725–4741. Article Google Scholar
Khan, T., Singh, K., Son, L. H., Abdel-Basset, M., Long, H. V., Singh, S. P., & Manjul, M. (2019). A novel and comprehensive trust estimation clustering based approach for large scale wireless sensor networks. IEEE Access,7, 58221–58240. Article Google Scholar
Desai, S. S., & Nene, M. J. (2019). Node-level trust evaluation in wireless sensor networks. IEEE Transactions on Information Forensics and Security,14(8), 2139–2152. Article Google Scholar
Mehetre, D. C., Roslin, S. E., & Wagh, S. J. (2018). Detection and prevention of black hole and selective forwarding attack in clustered WSN with Active Trust. Cluster Computing,1(1), 78–92. Google Scholar
Jinhui, X., Yang, T., Feiyue, Y., Leina, P., Juan, X., & Yao, H. (2018). Intrusion detection system for hybrid DoS attacks using energy trust in wireless sensor networks. Procedia Computer Science,131(1), 1188–1195. Article Google Scholar
Ji, Y. (2018). A wireless sensor network-based defence model against selective forwarding attack. International Journal of Online Engineering,14(5), 70–80. Article Google Scholar
Sivaganesan, D. (2021). A data driven trust mechanism based on blockchain in IoT sensor networks for detection and mitigation of attacks. Journal of trends in Computer Science and Smart technology (TCSST),3(01), 59–69. Article Google Scholar