[1]
|
Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002) Wireless Sensor Networks: A Survey. Computer Networks, 38, 393-422.
|
[2]
|
Ishmanov, F., Malik, A.S., Kim, S.W. and Begalov, B. (2013) Trust Management System in Wireless Sensor Networks: Design Considerations and Research Challenges. Transactions on Emerging Telecommunications Technologies.
|
[3]
|
Bao, F.Y., Chen, I.-R., Chang, M.J. and Cho, J.-H. (2012) Hierarchical Trust Management for Wireless Sensor Networks and Its Applications to Trust-Based Routing and Intrustion Detection. IEEE Transactions on Network and Service Management, 9, 169-183.
|
[4]
|
Ganeriwal, S., Balzano, L.K. and Srivastava, M.B. (2008) Reputation-Based Framework for High Integrity Sensor Networks. ACM Transactions on Sensor Networks, 4, 1-37.
|
[5]
|
Yao, Z., Kim, D. and Doh, Y. (2006) PLUS: Parameterized and Localized Trust Management Scheme for Sensor Networks Security. 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), Vancouver, October 2006, 437-446.
|
[6]
|
Duan, J.Q., Yang, D., Zhu, H.Q., Zhang, S.D. and Zhao, J. (2014) TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks. International Journal of Distributed Sensor Networks, Article ID: 209436.
http://dx.doi.org/10.1155/2014/209436
|
[7]
|
Lopez, J., Roman, R., Agudo, I. and Fernandez-Gago, C. (2010) Trust Management Systems for Wireless Sensor Networks: Best Practices. Computer Communications, 33, 1086-1093.
|
[8]
|
Chen, H.G., Wu, H.F., Hu, J.C. and Gao. C.S. (2008) Event-Based Trust Framework Model in Wireless Sensor Networks. Proceedings of International Conference on Neworking, Architecture, and Storage, 359-364.
|
[9]
|
Geetha, V. and Chandrasekaran, K. (2013) Enhanced Beta Trust Model for Identifying Insider Attacks in Wireless Sensor Networks. International Journal of Computer Science and Network Security (IJCSNS), 13, 14-19.
|