共 15 条
- [1] Marmol G., Perez M., Providing trust in wireless sensor networks using a bioinspired technique, Telecommunication Systems, 46, 2, pp. 163-180, (2013)
- [2] Zhang S., Chen J., Yang J., Study on cloud trust model based on cluster structure for wireless sensor networks, Journal of Sichuan University: Engineering Science Edition, 46, 6, pp. 32-37, (2014)
- [3] Boukercha A., Xua L., El-Khatibb K., Trust-based security for wireless ad hoc and sensor networks, Computer Communications, 30, 11-12, pp. 2413-2427, (2010)
- [4] Chen H., Wu H., Zhou X., Et al., Agent-based trust model in wireless sensor networks, Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, pp. 119-124, (2007)
- [5] Srinivasan A., Teitelbaum J., Wu J., DRBTS: distributed reputation-based Beacon trust system, Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, pp. 277-283, (2006)
- [6] Buchegger S., Le Boudec J.Y., Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, pp. 226-236, (2010)
- [7] He Q., Wu D., Khosla P., SORI: A secure and objective reputation-based incentive scheme for ad hoc networks, Proceedings of 2004 IEEE Wireless Communications & Networking Conference, pp. 825-830, (2011)
- [8] Zhong S., Chen J., Yang Y.R., Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks, Proceedings of the Twenty-second Annual Joint Conference of the IEEE Computer and Communications, pp. 1987-1997, (2003)
- [9] Wu Q., Liu Q., Trusted model of secure routing for VANET based on bayesian theory, Journal of Sichuan University: Engineering Science Edition, 47, 2, pp. 129-135, (2015)
- [10] Shafer G., A Mathematical Theory of Evidence[M, (1976)