[1] |
PERRIG A , SZEWCZYK R , WEN V et al. SPINS: security protocols for sensor networks[J]. Wireless Networks, 2002,8(5): 521-534.
|
[2] |
WATRO R , KONG D , CUTI S F et al. TinyPK: securing sensor networks with public key technology[A]. Proceedings of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks[C]. New York, USA, 2004. 59-64.
|
[3] |
荆琦, 唐礼勇, 陈钟 . 无线传感器网络中的信任管理[J]. 软件学报, 2008,19(7): 1716-1730. JING Q , TANG L Y , CHEN Z . Trust management in wireless sensor networks[J]. Journal of Software, 2008,19(7): 1716-1730.
|
[4] |
BLAZE M , FEIGENBAUM J , LACY J . Decentralized trust management[J]. IEEE Conference on Security and Privacy, Oakland, California, USA 1996. 164-173.
|
[5] |
GANERIWAL S , BALZANO L K , SRIVASTAVA M B . Reputa-tion-based framework for high integrity sensor networks[J]. ACM Transactions on Sensor Networks, 2008,4(3): 15.
|
[6] |
黄海生, 邹传伟 . 基于隶属云理论的主观信任评估模型研究[J]. 通信学报, 2008,24(4): 13-19. HUANG H S , WANG R C . Subjective trust evaluation model based on membership cloud theory[J]. Journal on Communications, 2008,29(4): 13-19
|
[7] |
KRANSNIEWSKI M D , VARADHARAJAN P , RABELER B et al. TIBFIT:trust index based fault tolerance for data faults in sensor network[A]. International Conference on Dependable Systems and Networks[C]. Washington DC, USA 2005. 672-681.
|
[8] |
MOMANI M , CHALLA S , ALHMOUZ R . BNWSN: Bayesian network trust model for wireless sensor networks[A]. Mosharaka International Conference on Communications, Computers and Applications[C]. Amman, Jordan 2008. 110-115.
|
[6] |
肖德琴, 冯健昭, 周权 . 等. 基于高斯分布的传感器网络的信誉模型[J]. 通信学报, 2008,29(3): 47-53. XIAO D Q , FENG J Z , ZHOU Q et al. Gauss reputation framework for sensor networks[J]. Journal on Communications, 2008,29(3): 47-53
|
[10] |
杨光, 印桂生, 杨武 . 等. 无线传感器网络基于节点行为的信誉评测模型[J]. 通信学报, 2009,30(12): 18-26. YANG G , YIN G S , YANG W et al. Reputation model based on behaviors of sensor nodes in WSN[J]. Journal on Communications, 2009,30(12): 18-26
|
|
蔡绍滨, 韩启龙, 高振国 . 等. 基于云模型的无线传感器网络恶意节点识别技术的研究[J]. 电子学报, 2012,40(11): 2232-2238. CAI S B , HAN Q L , GAO Z G et al. Research on cloud trust model for malicious node detection in wireless sensor network[J]. Acta Electronica Sinica, 2011,40(11): 2232-2238
|
[12] |
BAO F , CHEN R , CHANG M J et al. Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection[J]. IEEE Transactions on Network and Service Management, 2012,9(2): 169-183.
|
[13] |
李德毅, 杜鹢 . 确定性人工智能[M]. 北京: 国防工业出版社, 2005 LI D Y , DU Y . Artificial Intelligence with Uncertainty[M]. Beijing: National Defence Industry Press, 2005
|
[14] |
CHENG S , LI J , REN Q et al. Bernoulli sampling based (ε, δ)-ap-proximate aggregation in large-scale sensor networks[J]. Proc of the 29th IEEE INFOCOM, San Diego, CA, USA, 2010.1181-1189.
|