[1] |
ATZORI L , IERA A , MORABITO G . The Internet of Things: a sur-vey[J]. Computer Networks, 2010,54(15):2787-2805.
|
[2] |
ROMANA R , ZHOUA J , LOPEZB J . On the features and challenges of security & privacy in distributed Internet of Things[J]. Computer Networks, 2013,57(10):2266-2279.
|
[3] |
ZHU H , DU S , GAO Z , et al. A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant net-works[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,(99):1-6.
|
[4] |
LI X Y , ZHOU F , DU J , et al. LDTS: a lightweight and dependable trust system for clustered wireless sensor networks[J]. IEEE on Trans-actions on Information Forensics and Security, 2012,8(6):924-935.
|
[5] |
BAO F , CHEN R , CHANG M J , et al. Trust-based intrusion detection in wireless sensor networks[A]. 2011 IEEE International Conference on Communications (ICC)[C]. Kyoto, Japan: 2011.1-6.
|
[6] |
HE D , CHEN C , CHAN S , et al. A distributed trust evaluation model and its application scenarios for medical Sensor networks[J]. IEEE Transaction on Information Technology in Biomedicine, 2012,16(6):1164-1175.
|
[7] |
SUN B , SHAN X M , WU K , et al. Anomaly detection based secure in-network aggregation for wireless sensor networks[J]. IEEE Systems Journal, 2013,7(1):13-25.
|
[8] |
肖德琴, 冯健昭, 周权 等. 基于高斯分布的传感器网络信誉模型[J]. 通信学报 2008,29(3):47-53. XIAO D Q , FENG J Z , ZHOU Q , et al. Gauss reputation framework for sensor networks[J]. Journal on Communications, 2008,29(3):47-53.
|
[9] |
CROSBY G.V , HESTERL , PISSION N . Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor net-works[J]. International Journal Network Security, 2011,12(2):107-117.
|
[10] |
ZHANG J , SHANKARAN R , ORGUN M A , et al. A dynamic trust establishment and management framework for wireless sensor net-works[A]. 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC)[C]. Hong Kong, China, 2010.484-491.
|
[11] |
林闯, 田立勤, 王元卓 . 可信网络中用户行为可信的研究[J]. 计算机研究与发展 2008,45(12):2033-2043. LIN C , TIAN L Q , WANG Y Z . Research on user behavior trust in trustworthy network[J]. Journal of Computer Research and Develop-ment, 200845(12):2033-2043.
|
[12] |
ALZAID H , ALFARAJ M , RIES S , et al. Trust Management VII[M]. Berlin Heidelberg: Springer 2013. 66-82.
|
[13] |
胡向东, 余朋琴, 魏琴芳 . 物联网中选择性转发攻击的发现[J]. 重庆邮电大学学报 2012,24(2):148-152. HU X D , YU P Q , WEI Q F . Detection of selective forwarding attacks in the Internet of Things[J]. Journal of Chongqing University of Posts and Telecommunications, 2012,24(2):148-152.
|
[14] |
ZHAN G , SHI W , DENG J . Design and implementation of TARF: a trust-aware routing framework for WSNs[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(2):184-197.
|
[15] |
SHANKARAN R , VARADHARAJAN V , ORGUN M A , et al. Con-text-aware trust management for peer-to-peer mobile ad-hoc net-works[A]. 33rd Annual IEEE International Computer Software and Applications Conference[C]. Seattle, Washington, USA, 2009.188-193.
|
[16] |
JOSANG A , ISMAIL R , BOYD C . A survey of trust and reputation systems for online service provision[J]. Decision support systems, 2007,43(2): 618-644.
|