[1] Shashikala, Kavitha C.A survey on secured routing protocols for wireless sensor network[C]// Computing Communication & Networking Technologies, Third International Conference on. USA: IEEE, 2012: 1-8. [2] Chen X, Makki K, Yen K, et al. Sensor network security: a survey[J]. IEEE Communications Surveys & Tutorials (S1553-877X), 2009, 11(2): 52-73. [3] Marano S, Matta V, Tong L.Distributed Detection in the Presence of Byzantine Attack in Large Wireless Sensor Networks[C]// Military Communications Conference, IEEE. USA: IEEE, 2006: 1-4. [4] Momani M.Trust models in wireless sensor networks: a survey[M]// Recent Trends in Network Security and Applications. Germany: Springer Berlin Heidelberg (S1865-0929), 2010: 37-46. [5] Ganeriwal S, Srivastava M.B. Reputation-based framework for high integrity sensor networks[C]// the 2nd ACM workshop on Security of ad hoc and sensor networks. USA: ACM, 2004: 66-77. [6] 杨光, 印桂生, 杨武, 等. WSNs 基于信誉机制的恶意节点识别模型[J]. 哈尔滨工业大学学报, 2009 41(10): 158-162. [7] Yin G, Yang G, Yang W, et al. A novel reputation model for malicious node detection in wireless sensor network[C]// Wireless Communications, Networking and Mobile Computing, 4th International Conference on. USA: IEEE, 2008: 1-4. [8] Jiang J, Han G, Wang F, et al. An Efficient Distributed Trust Model for Wireless Sensor Networks[J]. IEEE Transactions on Parallel and Distributed Systems (S1045-9219), 2015, 26(5): 1228-1237. [9] Gheorghe L, Rughinis R, Tataroiu R.Adaptive Trust Management Protocol based on intrusion detection for Wireless Sensor Networks[C]// Networking in Education and Research, International Conference 12th Edition. USA: IEEE, 2013: 1-7. [10] Fang F, Li J, Li J.A reputation management scheme based on multi-factor in WSNs[C]// Mechatronic Sciences, Electric Engineering and Computer, International Conference on. USA: IEEE, 2013: 3843-3848. [11] Tajeddine A, Kayssi A, Chehab A.CENTER: A Centralized Trust-Based Efficient Routing protocol for wireless sensor networks[C]// Privacy, Security and Trust, Tenth Annual International Conference on. USA: IEEE, 2012: 195-202. [12] Gerrigagoitia K, Uribeetxeberria R, Zurutuza U, et al. Reputation-based Intrusion Detection System for wireless sensor networks[C]// Complexity in Engineering. USA: IEEE, 2012: 1-5. [13] Ukil A.Trust and Reputation Based Collaborating Computing in Wireless Sensor Networks[C]// Computational Intelligence, Modelling and Simulation, Second International Conference on. USA: IEEE, 2010: 464-469. |