[1]
|
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002) Wireless Sensor Networks: A Survey. Computer Networks, 38, 393-422. http://dx.doi.org/10.1016/S1389-1286(01)00302-4
|
[2]
|
Culler, D., Estrin, D. and Srivastava M. (2004) Overview of Sensor Networks. IEEE Computer Society, August 2004.
|
[3]
|
Chintalapudi, K., Fu, T., Paek, J., Kothari, N., Rangwala, S., Caffrey, J., Govindan, R., Johnson, E. and Masri, S. (2006) Monotoring Civil Structures with a Wireless Sensor Network. IEEE Internet Computing, 10, 26-34.
http://dx.doi.org/10.1109/MIC.2006.38
|
[4]
|
Mainwaring, et al. (2002) Wireless Sensor Networks for Habitat Monotoring. International Workshop on Wireless Sensor Networks and Applications (ACM). http://dx.doi.org/10.1145/570738.570751
|
[5]
|
Karlof, C. and Wagner, D. (2003) Secure Routing in Sensor Networks: Attacks and Countermeasures. First IEEE International Workshop on Sensor Network Protocols and Applications.
|
[6]
|
Perrig, A., Zewczyk, R., Wen, V., Culler, D. and Tygar, D. (2002) SPINS: Secirity Protocols for Sensor Networks. Wireless Networks, 8, 521-534. http://dx.doi.org/10.1023/A:1016598314198
|
[7]
|
Shaikh, R.A., Lee, S., Khan, M.A.U. and Song, Y.J. (2006) LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network. Proceedings of 11th IFIP International Conference on Personal Wireless Communication (PWC’06), Spain, September 2006.
|
[8]
|
Zhang, Y., Liu, W., Lou, W. and Fang, Y. (2006) Location-Based Compromise Tolerant Security Mechanisms for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications, 24, 247-260.
http://dx.doi.org/10.1109/JSAC.2005.861382
|
[9]
|
Karlof, C., Sastry, N. and Wagner, D. (2004) TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, 162-175.
http://dx.doi.org/10.1145/1031495.1031515
|
[10]
|
Zahariadis, T., Leigou, H.C., Trakadas, P. and Voliotis, S. (2010) Mobile Networks: Trust Management in Wireless Sensor Networks. European Transactions on Telecommunications, 21, 386-395.
|
[11]
|
Sun, Y., Han, Z. and Liu, K.J.R. (2008) Defense of Trust Management Vulnerabilities in Distributed Networks. IEEE Communications Magazine, 46, 112-119.
|
[12]
|
Saraogi, M. (2005) Security in Wireless Sensor Networks. Department of Computer Science, University of Tennessee, Knoxville.
|
[13]
|
Lopez, J., Roman, R., Agudo, I. and Fernandez-Gago, C. (2010) Trust Management Systems for Wireless Sensor Networks: Best Practices. Computer Communications, 33, 1086-1093. http://dx.doi.org/10.1016/j.comcom.2010.02.006
|
[14]
|
Momani, M. (2008) Bayesian Methods for Modeling and Management of Trust in Wireless Sensor Networks. Ph.D. Thesis, University of Technology, Sydney.
|
[15]
|
Babu, S.S., Raha, A. and Naskar, M.K. (2011) A Direct Trust Dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP). Wireless Sensor Network, 3, 125-134. http://dx.doi.org/10.4236/wsn.2011.34015
|
[16]
|
Trakadas, P., Maniatis, S., Zahariadis, T., Leigou, H.C. and Voliotis, S. (2009) A Novel Flexible Trust Management System for Heterogeneous Sensor Networks. International Symposium on Autonomous Decentralized Systems, ISADS 2009, Athens, 23-25 March 2009, 369-374.
|
[17]
|
Liu, K., Abu-Ghazaleh, N. and Kang, K.D. (2007) Location Verification and Trust Management for Resilient Geographic Routing. Journal of Parallel and Distributed Computing, 67, 215-228.
http://dx.doi.org/10.1016/j.jpdc.2006.08.001
|
[18]
|
Kim, T.K. and Seo, H.S. (2008) A Trust Model Using Fuzzy Logic in Wireless Sensor Network. Proceedings of World Academy of Science, Engineering and Technology, 44, 69.
|