[1]孙利民,李建中,陈渝.无线传感器网络[M].北京:清华大学出版社,2005.
[2]XIE Miao,HAN Song,TIAN Biming,et al.Anomaly detection in wireless sensor networks:a survey[J].Journal of Network and Computer Applications,2011,3(4):1302-1325.
[3]BOUKERCH A,XU L,EL KHATIB K.Trust-based security for wireless Ad Hoc and sensor networks[J].Computer Communications,2007(30):2413-2427.
[4]CROSBY G V,PISSINOU N,GADZE J.A framework for trust-based cluster head election in wireless sensor networks[C].Piscataway:Proceeding of the 2nd IEEE Workshop on Dependability and Security in Sensor Networks and Systems (DSSNS),2006.
[5]ZHAN Guoxing,SHI Weisong,DENG Julia.TARF:a trust-aware routing framework for wireless sensor networks[C].Heidelberg:Proceeding of the 7th European Conference on Wireless Sensor Networks,2010.
[6]SAFA F,ARTAIL H,TABET D.A cluter-based trust-aware routing protocol for mobile Ad Hoc networks[J].Wireless Networks,2010(16):969-984.
[7]SONG F,ZHAO B H.Trust-based LEACH protocol for wireless sensor networks[C].Hainan:Proceeding of the 2th International Conference on Future Generation Communication and Networking,2008.
[8]WANG Weichao,DU Fei,XU Qijian.An improvement of LEACH routing protocol based on trust for wireless sensor networks[C].Beijing:Proceeding of the 5th International Conference on Wireless Communications,Networking and Mobile Computing,2009.
[9]DONG Huihui,GUO Yajun,YU Zhongqiang,et al.A wireless sensor networks based on multi-angle trust of node[J].Computer Science,2009,36(9):43-45. |