[1]Dong Huihui, Guo Yajun, Yu Zhongqiang, et al. A wireless sensor networks based on multiangle trust of node[C]∥Proc of 2009 International Forum on Information Technology and Applications, 2009:2831.
[2]Lindsey S, Raghavendra C, Sivalingam K M. Data gathering algorithms in sensor network using energy metrics [J].IEEE Transactions on Parallel and Distributed Systems, 2002, 13(9):924935.
[3]Ganeriwal S,Balzano L K,Srivastava M B.Reputationbased framework for high integrity sensor networks[J]. ACM Transactions on Sensor Networks, 2008, 4(3):137.
[4]Momani M, Agbinya J, Navarrete G P. A new algorithm of trust formation in wireless sensor networks[C]∥Proc of the 1st IEEE International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless ’06), 2006:16.
[5]da Silva A P R, Martins M H T, Rocha B P S, et al. Decentralized intrusion detection in wireless sensor networks[C]∥Proc of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks, 2005:1623.
[6]Tseng ChinYang,Balasubramanyam P,Ko C,et al.A specificationbased intrusion detection system for AODV[C]∥Proc of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks, 2003:125134.
[7]Buchegger S, Boudec JeanYves L. The selfish node:Increasing routing security for mobile ad hoc networks[R]. RZ 3354(#93400). Switzerland:IBM Zurich Research Laboratory, 2001.
[8]Buchegger S, Boudec JeanYves L. Nodes bearing grudges:Towards routing security, fairness, and robustness in mobile ad hoc networks[C]∥Proc of the 16th Euromicro Conference on Parallel, Distributed and Networkbased Processing, 2008:403410.
[9]Buchegger S, Boudec JeanYves L. Performance analysis of the CONFIDANT protocol(Cooperation of nodes:Fairness in dynamic adhoc networks)[C]∥Proc of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing(MobiHOC), 2002:226236.
[10]Zhou Xingfeng. A study on ad hoc network intrusion detection system model based on credibility[D]. Nanjing:Nanjing University of Science and Technology, 2006.(in Chinese)
[11]PoWah Yau, Mitchell C J. Reputation methods for routing security for mobile ad hoc network[C]∥Proc of the 1st Workshop on Mobile Future and Symposium on Trends in Communications, 2003:130137.
[12]Hur J, Lee Y, Hong S M, et al. Trust management for resilient sensor networks[C]∥Proc of the ICISC’05, 2006:5668.
[13]Hur J, Lee Y, Yoon H, et al. Trust evaluation model for wireless sensor network[C]∥Proc of the ICACT’05, 2005:491496.
[14]Logan J D.Applied mathematics (a contemporary approach) [M]. New York:Wiley, 1987.
附中文参考文献:
[10]周兴锋. 基于信任度AD HOC网络入侵检测系统模型研究[D]. 南京:南京理工大学, 2006. |