Abstract
With the rising number of wireless sensor networks arranged in harsh environments, the sensor nodes are likely to be captured by the enemy, so that the data gathered under great security threat. Therefore, to deal with the attacks in the captured data aggregation node process, to ensure reliable data aggregation has become an important part of wireless sensor network security research.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Zhang, X.: Heterogeneous statistical QoS provisioning over 5G mobile wireless networks. IEEE Netw. 11(6), 46–53 (2014)
Gabale, V.: A classification framework for scheduling algorithms in wireless mesh networks. IEEE Commun. Surv. Tutorials 5(1), 199–222 (2012)
Bukhari, S.H.R.: A survey of channel bonding for wireless networks and guidelines of channel bonding for futuristic cognitive radio sensor networks. IEEE Commun. Surv. Tutorials 18, 924–948 (2015)
Wang, X.: Scalable routing modeling for wireless ad hoc networks by using polychromatic sets. IEEE Syst. J. 7, 50–58 (2012)
Yulei, W.: Performance analysis of hybrid wireless networks under bursty and correlated traffic. IEEE Trans. Veh. Technol. 62, 449–454 (2012)
Shen, H.: A scalable and mobility-resilient data search system for large-scale mobile wireless networks. IEEE Trans. Parall. Distrib. Syst. 25, 1124–1134 (2013)
Fotouhi, H.: Reliable and fast hand-offs in low-power wireless networks. IEEE Trans. Mobile Comput. 13, 2620–2633 (2014)
Zhang, R.: A hybrid reservation/contention-based MAC for video streaming over wireless networks. IEEE J. Sel. Areas Commun. 28, 389–398 (2010)
Ahmed, A.: Enabling vertical handover decisions in heterogeneous wireless networks: a state-of-the-art and a classification. IEEE Commun. Surv. Tutorials 16, 776–811 (2013)
Park, J.-H.: All-terminal reliability analysis of wireless networks of redundant radio modules. IEEE Internet Things J. 3, 219–230 (2016)
Niati, R.: Throughput and energy optimization in wireless networks: joint mac scheduling and network coding. IEEE Trans. Veh. Technolo. 61, 1372–1382 (2012)
Acknowledgements
I would like to express my gratitude to all those who helped me during the writing of this thesis. I gratefully acknowledge the help of my supervisor Professor Zhao Hai. I do appreciate his patience, encouragement, and professional instructions during my thesis writing. Also, I would like to thank Mr Chengdw who kindly gave me a hand in the preparation of the thesis.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Chunlong, Y., Hai, Z. (2017). Study Security Technology of Complex Network Based on Trust Data Aggregation. In: Xhafa, F., Patnaik, S., Yu, Z. (eds) Recent Developments in Intelligent Systems and Interactive Applications. IISA 2016. Advances in Intelligent Systems and Computing, vol 541. Springer, Cham. https://doi.org/10.1007/978-3-319-49568-2_36
Download citation
DOI: https://doi.org/10.1007/978-3-319-49568-2_36
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49567-5
Online ISBN: 978-3-319-49568-2
eBook Packages: EngineeringEngineering (R0)