[1] Yick J, Mukherjee B, Ghosal D.Wireless Sensor Network Survey[J]. Computer Networks (S1389-1286), 2008, 52(12): 2292-2330. [2] Kumar V, Jain A, Barwal P N.Wireless Sensor Networks: Security Issues, Challenges and Solutions[J]. International Journal of Information & Computation Technology (S0974-2239), 2014, 4(8):859-868. [3] Seo S H, Won J, Sultana S, et al.Effective key management in dynamic wireless sensor networks[J]. IEEE Transactions on Information Forensics and Security (S1556-6013), 2015, 10(2): 371-383. [4] Tahta U E, Sen S, Can A B.GenTrust: A genetic trust management model for peer-to-peer systems[J]. Applied Soft Computing (S1568-4946), 2015, 34: 693-704. [5] Han G, Jiang J, Shu L, et al.Management and Applications of Trust in Wireless Sensor Networks: A Survey[J]. Journal of Computer and System Sciences (S0022-0000), 2014, 80(3): 602-617. [6] Ishmanov F, Malik A S, Kim S W, et al.Trust Management System in Wireless Sensor Networks: Design Considerations and Research Challenges[J]. Transactions on Emerging Telecommunications Technologies (S2161-3915), 2015, 26(2): 107-130. [7] Ganeriwal S, Balzano L K, Srivastava M B.Reputation-based Framework for High Integrity Sensor Networks[J]. ACM Transactions on Sensor Networks (S1550-4859), 2008, 4(3): 15. [8] 房卫东, 石志东, 单联海,等. 一种基于BETA分布抗On-off攻击的信任机制[J]. 系统仿真学报,2015, 27(11): 2722-2728. Fang W D, Shi Z D, Shan L H, et al.Trusted Scheme for Defending On-Off Attack Based on BETA distribution[J]. Journal of System Simulation, 2015, 27(11): 2722-2728. [9] Ishmanov F, Kim S W, Nam S Y.A Secure Trust Establishment Scheme for Wireless Sensor Networks[J]. Sensors (S1424-8220), 2014, 14(1): 1877-1897. [10] Duan J, Gao D, Yang D, et al.An Energy-aware Trust Derivation Scheme with Game Theoretic Approach in Wireless Sensor Networks for IOT Applications[J]. IEEE Internet of Things Journal, 2014, 1(1): 58-69. [11] Che S, Feng R, Liang X, et al.A Lightweight Trust Management Based on Bayesian and Entropy for Wireless Sensor Networks[J]. Security and Communication Networks (S1939-0114), 2015, 8(2): 168-175. [12] Jiang J, Han G, Wang F, et al.An Efficient Distributed Trust Model for Wireless Sensor Networks[J]. IEEE Transactions on Parallel and Distributed Systems (S1045-9219), 2015, 26(5): 1228-1237. [13] 成坚, 冯仁剑, 许小丰,等. 基于D-S证据理论的无线传感器网络信任评估模型[J]. 传感技术学报, 2009, 22(12): 1802-1807. Cheng J, Feng R J, Xu X F, et al.Trust evaluation model based on D-S evidence theory in wireless sensor networks[J]. Chinese Journal of sensor and actuators, 2009, 22(12): 1802-1807. [14] Feng R, Che S, Wang X, et al.Trust Management Scheme Based on DS Evidence Theory for Wireless Sensor Networks[J]. International Journal of Distributed Sensor Networks (S1550-1329), 2013, 9(6): 1-9. [15] 姚雷, 王东豪, 梁璇,等. 无线传感器网络多层次模糊信任模型研究[J]. 仪器仪表学报, 2014, 35(7): 1606-1613. Yao L, Wang D H, Liang X, et al.Research on multi-level fuzzy trust model for wireless sensor networks[J]. Chinese Journal of Scientific Instrument, 2014, 35(7): 1606-1613. [16] Wahid A, Kumar P.A Survey on Attacks, Challenges and Security Mechanisms in Wireless Sensor Network[J]. International Journal for Innovative Research in Science and Technology (S2349-6010), 2015, 1(8): 189-196. [17] 吴银锋, 周翔, 冯仁剑,等. 基于节点信任值的无线传感器网络安全路由[J]. 仪器仪表学报, 2012, 33(1): 221-228. Wu Y F, Zhou X, Feng R J, et al.Secure routing based on node trust value in wireless sensor networks[J]. Chinese Journal of Scientific Instrument, 2012, 33(1): 221-228. |