[1] |
付帅, 马建峰, 李洪涛 ,等. 无线传感器网络中匿名的聚合节点选举协议[J]. 通信学报, 2015,36(2): 1-10.
|
|
FU S , MA J F , LI H T ,et al. Anonymous aggregator election protocol for wireless sensor networks[J]. Journal of Communications, 2015,36(2): 1-10.
|
[2] |
盛敏, 田野, 李建东 . 无线传感器网络与自组织网络的研究现状[J]. 中兴通讯技术, 2010,6(4): 29-37.
|
|
SHENG M , TIAN Y , LI J D . The research situation of wireless sensor networks and ad hoc networks[J]. ZTE Communications, 2010,6(4): 29-37.
|
[3] |
陈正宇, 杨庚, 陈蕾 ,等. 无线传感器网络数据融合研究综述[J]. 计算机应用研究, 2011,10(5): 6-8.
|
|
CHEN Z Y , YANG G , CHEN L ,et al. Summary of wireless sensor network data fusion research[J]. Application Research of Computers, 2011,10(5): 6-8.
|
[4] |
SAMUNDISWARY P , DANANJAYAN P . Performance analysis of trust based AODV for wireless sensor networks[J]. International Journal of Computer Applications, 2010,4(12): 6-12.
|
[5] |
唐礼勇, 陈钟 . 无线传感器网络中的信任管理[J]. 软件学报, 2008,19(7): 1716-1730.
|
|
TANG L Y , CHEN Z . Trust management in wireless sensor networks[J]. Journal of Software, 2008,19(7): 1716-1730.
|
[6] |
陈鸿龙, 王志波, 王智 ,等. 针对虫洞攻击的无线传感器网络安全定位方法[J]. 通信学报, 2015,36(3): 106-113.
|
|
CHEN H L , WANG Z B , WANG Z ,et al. Secure localization scheme against wormhole attack for wireless sensor networks[J]. Journal of Communications, 2015,36(3): 106-113.
|
[7] |
MOHAMMAD A K A , GADADHAR S . Enhancing cooperation in MANET using neighborhood compressive sensing model[J]. Egyptian Informatics Journal, 2016,6(19): 1-15.
|
[8] |
SUN Y , HAN Z , LIU K J R . Defense of trust management vulnerabilities in distributed networks[J]. IEEE Journals and Magazines, 2008,46(2): 112-119.
|
[9] |
CORDASCO J , WETZEL S . Cryptographic versus trust-based methods for MANET routing security[J]. Electronic Notes in Theoretical Computer Science, 2008,197(2): 131-140.
|
[10] |
易丽华 . “看门狗”技术的实现[J]. 仪表技术, 2011,6(7): 55-57.
|
|
YI L H . Watchdog theory and realization[J]. Instrumentation Technology, 2011,6(7): 55-57.
|
[11] |
JAY R , SUNIL V , CHIRAG G . Securing VANET by preventing attacker node using watchdog and bayesian network theory[J]. Procedia Computer Science, 2016,79(6): 649-656.
|
[12] |
ZHANG M C , XU C Q , GUAN J F ,et al. B-iTRF:a novel bio-inspired trusted routing framework for wireless sensor networks[C]// 2014 IEEE Wireless Communications and Networking Conference (WCNC). 2014: 2242-2247.
|
[13] |
LU G . Design and implement of intrusion detection system network security[M]. Procedia Computer Science, 2003: 11-16.
|
[14] |
XU P F , CHEN Z G , DENG X H . Research on neighboring graphs based topology control in wireless sensor networks[M]. Electronic Industry Press,Beijing, 2006: 13-17.
|
[15] |
常建娥, 蒋太立 . 层次分析法确定权重的研究[J]. 武汉理工大学学报, 2007,29(1): 153-156.
|
|
CHANG J E , JIANG T L . Research on the weight of coefficient through analytic hierarchy process[J]. Journal of Wuhan University of Technology, 2007,29(1): 153-156.
|
[16] |
SUN Y L , YU W , HAN Z . Information theoretic framework of trust modeling and evaluation for ad hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2006,24(2): 305-315.
|
[17] |
田俊峰, 陈小祥, 刘涛 . 一种基于半环理论的可信性评估模型[J]. 计算机工程与应用, 2008,44(15): 88-91.
|
|
TIAN J F , CHEN X Y , LIU T . Trust evaluation model based on semiring[J]. Computer Engineering and Applications, 2008,44(15): 88-91.
|
[18] |
王强, 焦俊, 孔文 ,等. 基于NS2的固定和移动节点的无线传感网络的仿真[J]. 合肥学院学报(自科版), 2015,25(2): 24-28.
|
|
WANG Q , JIAO J , KONG W ,et al. The Simulation of wireless sensor networks which includes Fixed nodes and mobile node based on NS2[J]. Journal of Hefei University(Natural Science Edition), 2015,25(2): 24-28.
|
[19] |
MAHMOUD M E , SHEN X . Trust-based and energy-aware incentive routing protocol for multi-hop wireless networks[C]// The IEEE International Conference on Communications (ICC ’11). 2011, 6: 1-5.
|
[20] |
MARCHANGL N , DATTA R . Light-weight trust-based routing protocol for mobile ad hoc networks[J]. IET Information Security, 2012,6(2): 77-83.
|