TY - STD TI - Li Y-X, Qin L, Liang Q (2010) Research on wireless sensor network security. In: International conference on computational intelligence and security, pp 493–496 ID - ref1 ER - TY - JOUR AU - Chen, X. AU - Makki, K. AU - Yen, K. AU - Pissinou, N. PY - 2009 DA - 2009// TI - Sensor network security: a survey JO - IEEE Commun Surv Tutorials VL - 11 UR - https://doi.org/10.1109/SURV.2009.090205 DO - 10.1109/SURV.2009.090205 ID - Chen2009 ER - TY - JOUR AU - Perrig, A. AU - Szewczyk, R. AU - Wen, V. AU - Cullar, D. AU - Tygar, J. D. PY - 2002 DA - 2002// TI - SPINS: security protocols for sensor networks JO - Int J Commun Comput Inform VL - 8 ID - Perrig2002 ER - TY - JOUR AU - Murat, D. PY - 2014 DA - 2014// TI - Security analysis in wireless sensor networks JO - Int J Distrib Sens Netw VL - 2014 ID - Murat2014 ER - TY - JOUR AU - Necla, B. AU - Ismail, E. PY - 2012 DA - 2012// TI - WSNSec: a scalable data link layer security protocol forWSNs JO - Ad Hoc Netw VL - 10 UR - https://doi.org/10.1016/j.adhoc.2011.04.013 DO - 10.1016/j.adhoc.2011.04.013 ID - Necla2012 ER - TY - STD TI - Chen H, Perrig A, Song D (2003) Random Key Predistribution Schemes for Sensor Networks, Proceedings of the 2003 IEEE symposium on security and privacy, pp 197–213 ID - ref6 ER - TY - JOUR AU - Sathees, S. AU - Balasubadra, K. PY - 2018 DA - 2018// TI - Chronic privacy protection from source to sink in sensor network routing JO - Int J Appl Eng Res VL - 13 ID - Sathees2018 ER - TY - STD TI - Ranjeetha S, Renuga N, Sharmila R (2017) Secure zone routing protocol for MANET. In: International conference on emerging trends in engineering, science and sustainable technology (ICETSST-2017), pp 67–76 ID - ref8 ER - TY - JOUR AU - Ahmad, S. J. AU - Radha Krishna, P. PY - 2018 DA - 2018// TI - BHQRSM: binary hex quadratic residue security model to enhance the trust in MANETs JO - Wireless Pers Commun VL - 101 UR - https://doi.org/10.1007/s11277-018-5710-9 DO - 10.1007/s11277-018-5710-9 ID - Ahmad2018 ER - TY - JOUR AU - Jiye, K. AU - Moon, J. AU - Jung, J. AU - Won, D. PY - 2016 DA - 2016// TI - Security analysis and improvements of session key establishment for clustered sensor networks JO - Hindawi Publish Corp J Sens VL - 2016 ID - Jiye2016 ER - TY - JOUR AU - Du, X. AU - Guizani, M. AU - Xiao, Y. AU - Chen, H. -. H. PY - 2008 DA - 2008// TI - Secure and efficient time synchronization in heterogeneous sensor networks JO - IEEE Trans Vehic Tech VL - 57 UR - https://doi.org/10.1109/TVT.2007.912327 DO - 10.1109/TVT.2007.912327 ID - Du2008 ER - TY - JOUR AU - Guo, S. AU - Shen, A. N. PY - 2010 DA - 2010// TI - A compromise-resilient pair-wise rekeying protocol in hierarchical wireless sensor networks JO - Comput Syst Sci Eng VL - 25 ID - Guo2010 ER - TY - JOUR AU - Zhang, W. AU - Zhu, S. AU - Cao, G. PY - 2009 DA - 2009// TI - Pre distribution and local collaboration-based group rekeying for wireless sensor networks JO - Ad Hoc Netw VL - 7 UR - https://doi.org/10.1016/j.adhoc.2008.11.004 DO - 10.1016/j.adhoc.2008.11.004 ID - Zhang2009 ER - TY - JOUR AU - Zhang, Y. AU - Wu, C. AU - Cao, J. AU - Li, X. PY - 2013 DA - 2013// TI - A secret sharing-based key management in a hierarchical wireless sensor network JO - Int J Distrib Sens Netw VL - 2013 UR - https://doi.org/10.1155/2013/469076 DO - 10.1155/2013/469076 ID - Zhang2013 ER - TY - JOUR AU - Zhengwang, Y. AU - Wen, T. AU - Song, X. AU - Liu, Z. AU - Fu, C. PY - 2017 DA - 2017// TI - An efficient dynamic trust evaluation model for wireless sensor networks JO - J Sens VL - 2017 UR - https://doi.org/10.1155/2017/7864671 DO - 10.1155/2017/7864671 ID - Zhengwang2017 ER - TY - STD TI - Imad J, Mohammed F, Jaroodi JA, Mohamed N (2016) TRAS: a trust-based routing protocol for ad hoc and sensor networks. In: IEEE 2nd international conference on big data security on cloud, IEEE international conference on high performance and smart computing, IEEE international conference on intelligent data and security, pp 382–387 ID - ref16 ER - TY - STD TI - Padmaja, Marutheswar GV (2017) Detection of malicious node in wireless sensor network. In: Proceedings on IEEE advanced computer conference (IACC), pp 193–198 ID - ref17 ER - TY - JOUR AU - Noor, Z. AU - Jung, L. AU - Alsaadi, F. AU - Alghamdi, T. PY - 2012 DA - 2012// TI - Wireless sensor network (WSN) routing security, reliability and energy efficiency JO - J Appl Sci VL - 12 UR - https://doi.org/10.3923/jas.2012.593.597 DO - 10.3923/jas.2012.593.597 ID - Noor2012 ER - TY - JOUR AU - Tao, Y. AU - Xiangyang, X. AU - Tonghui, L. AU - Leina, P. PY - 2018 DA - 2018// TI - A secure routing of wireless sensor networks based on trust evaluation model JO - Procedia Comput Sci VL - 131 ID - Tao2018 ER - TY - JOUR AU - Li, P. AU - Xiaotian, Y. u. AU - He, X. AU - Jiewei Qian, L. AU - Dong, H. N. PY - 2017 DA - 2017// TI - Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks. Security and Communication JO - Networks D VL - 2017 UR - https://doi.org/10.1155/2017/6102780 DO - 10.1155/2017/6102780 ID - Li2017 ER - TY - JOUR AU - Kaur, J. AU - Gill, S. S. AU - Dhaliwal, B. S. PY - 2016 DA - 2016// TI - Secure trust based key management routing framework for wireless sensor networks JO - J Eng VL - 2016 UR - https://doi.org/10.1155/2016/2089714 DO - 10.1155/2016/2089714 ID - Kaur2016 ER - TY - JOUR AU - Ahmad, S. J. AU - Damodaram, A. AU - Reddy, V. S. K. AU - Krishna, P. R. PY - 2013 DA - 2013// TI - Location aware and energy efficient routing protocol for long distance MANETs JO - Int J Netw Virtual Organ VL - 13 UR - https://doi.org/10.1504/IJNVO.2013.064461 DO - 10.1504/IJNVO.2013.064461 ID - Ahmad2013 ER -