[1] Dhakne D. and P. Chatur, Distributed trust-based intrusion detection approach in wireless sensor network, Proc. IEEE Int. Conf. Commun. Control Intell. Syst., Nov. Pp. 96101 (2015)
[2] He, D., C. Chen, S. Chan, J. Bu and A.V. Vasilakos, Re Trust: Attack-resistent and lightweight trust mana-gement for medical sensor networks,” IEEE Trans. Inf. Technol. Biomed. 16(4): 623-632 (2012)
[3] Bao, F., I.-R. Chen, M. Chang and J. Cho, Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection.' IEEE Trans. Netw. Service Manage 9 (2): 169-183 (2012)
[4] Dhakne D.,P.Chatur,Nov, 2015.Distributed trust-based intrusion detection approach in wireless sensor network,Proc. IEEE Int. Conf. Commun. Control Intell 96101 -
[5] He,D. , C.,Chen , S.,Chan , J.,Bu and A.V.,Vasilakos, 2012.Attack-resistent and lightweight trust management for medical sensor networks,” IEEE Trans. Inf. Technol. Biomed 16 623 -632
[6] Bao , F.,I.-R.Chen,M.Chang,J.Cho, 2012.Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,' IEEE Trans. Netw. Service Manage 9 169 -183
[7] Hao , F.,G.Min,M.Lin,C.Luo,L.Yang, 2014.An efficient fuzzy trus inference mechanism in mobile social networks,IEEE Trans. Parallel Distrib. Syst 25 2944 -2955
[8] Bao , F.,I.R.Chem,M.Chang,J.Cho, 2012.Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection,IEEE Trans. Netw. Service Manage 9 169 -183
[9] Han , G,J.Jiang,L.Shu,M.Guizani, 2015.An attackresistant trust model based on multidimensional trust matrics in under water acoustics sensor network,IEEE Trans. Mobile Comput 14 2447 -2459
[10] Butun , I., S.D.,Morgera and R.,Sankar, 2014.A survey of intrusion detection systems in wireless sensor networks,IEEE Commun. Surveys Tuts 16 234 -241
[11] OnatI.,A.Miri, 2005.An intrusion detection system for wireless sensor networks,Proc. IEEE Int. Conf. Wireless Mobile Comput. Netw. Commun. Aug 253 259 -
[12] Rajesh kumar , T. and K.,Geetha, 2016.,International Journal of Innovative Research in Computer and Communication Engineering 4 -
[13] Rajesh kumar , T. and K.,Geetha,:, 2017.An Artificial Technique Based Approach for Channel Selection and Classification of Electroencephalogram Signals,International Journal of Printing, Packaging & Allied Sciences 5 -
[14] Rajesh kumar , T., K.,Geetha , R.,Satheesh and N.S.,Barkath, 2017.MRI Brain Image Segmentation using Fuzzy C Means Cluster Algorithm for Tumor Area Measurement,International Journal of Engineering Technology Science and Research 4 929 -935
[15] Rajesh kumar , T., S.,Preethi , R. Siva,Rubini and V.,Yamini, 2018.speed detecting and reporting system using GPS/GPRS AND GSM,International Journal of Pure and Applied Mathematics 118 73 -79
[16] Rajesh kumar , T., G.,N.N.Deepika,S.Priyadharshini, 2017.An Integrated Density Based Traffic Load Balancing System in A Cloud Environment,Pak. J. Biotechnol 14 623 -627
[17] Ganeriwal S.,M.Srivastava, 2004.Reputation-based framework for high integrity sensor networks,ACM Trans. Sensor Netw 4 66 -77
[18] Yu , Y.,K.Li,W.Zhou,P.Li, 2012.Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures,J. Netw. Comput. Appl 867880 -
[19] ZhihuaZhang, 2017.Intrusion Detection Based on State Context and Hierarchical Trust in Wireless Sensor Networks,IEEE Translations and content mining -