Abstract:
To deal with the malicious behaviors of the aggregators and the malicious route behaviors of the nodes in the wireless sensor networks, the trusted value and residual ene...Show MoreMetadata
Abstract:
To deal with the malicious behaviors of the aggregators and the malicious route behaviors of the nodes in the wireless sensor networks, the trusted value and residual energy for the nodes are used to choose the aggregators, a relatively reliable path is secretly selected to transfer the data aggregation results, and a secure clustering and reliable disjoint multi-path route discovery method is proposed by the functional-trust based secure data aggregation method. The simulated experimental results in NS2 platform show that the proposed method can reduce the impact of the malicious nodes on the networks and improve the reliability of the wireless sensor networks.
Published in: 2014 Sixth International Symposium on Parallel Architectures, Algorithms and Programming
Date of Conference: 13-15 July 2014
Date Added to IEEE Xplore: 07 October 2014
ISBN Information: