[1] 郭志鹏, 李娟, 赵友刚, 等.物联网中的无线传感器网络技术综述[J].计算机与应用化学, 2019, 36(1):72-83. GUO Z P, LI J, ZHAO Y G, et al.Review of wireless sensor networks technology in internet of things[J].Computers and Applied Chemistry, 2019, 36(1):72-83.(in Chinese) [2] SANDEEP V, NEETU S, AJAY K S.Genetic algorithm-based optimized cluster head selection for single and multiple data sinks in heterogeneous wireless sensor network[J].Applied Soft Computing Journal, 2019, 85(3):1-21. [3] SELVAKUMAR K, SAIRAMESH L, KANNAN A.An intelligent energy aware secured algorithm for routing in wireless sensor networks[J].Wireless Personal Communications, 2017, 96(3):1-18. [4] DEVANAGAVI G D, NALINI N, BIRADAR R C.Secured routing in wireless sensor networks using fault-free and trusted nodes[J].International Journal of Communication Systems, 2016, 29(1):170-193. [5] WANG Y, ZHANG M, SHU W.An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks[J].EURASIP Journal on Wireless Communications and Networking, 2018(1):145. [6] 王潮, 贾翔宇, 林强.基于可信度的无线传感器网络安全路由算法[J].通信学报, 2008, 29(11):105-113. WANG C, JIA X Y, LIN Q.Trust based secure routing algorithm for wireless sensor networks[J].Journal on Communications, 2008, 29(11):105-113.(in Chinese) [7] 秦丹阳, 贾爽, 杨松祥, 等.基于信任感知的无线传感器网络安全路由机制研究[J].通信学报, 2017, 38(10):60-70. QIN D Y, JIA S, YANG S X, et al.Research on trust sensing based secure routing mechanism for wireless sensor network.[J].Journal on Communications, 2017, 38(10):60-70.(in Chinese) [8] ALMAZYAD A S.Reputation-based mechanisms to avoid misbehaving nodes in Ad Hoc and wireless sensor networks[J].Neural Computing and Applications, 2018, 29(9):597-607. [9] TANG J W, LIU A F, ZHANG J, et al.A trust-based secure routing scheme using the trace back approach for energy-harvesting wireless sensor networks[J].Sensors, 2018, 18(3):751. [10] AHMED A, BAKAR K A, CHANNA M I, et al.Countering node misbehavior attacks using trust based secure routing protocol[J].Telkomnika, 2015, 13(1):260-268. [11] ALFARRAJ O, ALZUBI A, TOLBA A.Trust-based neighbor selection using activation function for secure routing in wireless sensor networks[J].Journal of Ambient Intelligence and Humanized Computing, 2018, 6:1-11. [12] SELVI M, THANGARAMYA K, GANAPATHY S, et al.An energy aware trust based secure routing algorithm for effective communication in wireless sensor network[J].Wireless Personal Communications, 2019, 105:1475-1490. [13] AHMED A, BAKAR K A, CHANNA M I, et al.Energy-aware and secure routing with trust for disaster response wireless sensor network[J].Peer-to-Peer Networking and Applications, 2017, 10(1):216-237. [14] PRIAYOHESWARI B, KULOTHUNGAN K, KANNAN A.Beta reputation and direct trust model for secure communication in wireless sensor networks[C]//Proceedings of the International Conference on Informatics and Analytics.New York, USA:ACM Press, 2016:73. [15] 陶洋, 潘蕾娜, 王进, 等.防御信任攻击的无线传感器网络安全信任评估模型[J].传感技术学报, 2018, 31(12):100-105. TAO Y, PAN L N, WANG J, et al.A security trust evaluation model for wireless sensor networks defense against trust attacks[J].Chinese Journal of Sensors and Actuators, 2018, 31(12):100-105.(in Chinese) [16] 陶洋, 许湘扬, 李朋, 等.WSN中能量优化的安全路由算法[J].计算机工程与设计, 2018, 39(12):3638-3642. TAO Y, XU X Y, LI P, et al.Energy-optimized secure routing algorithm in WSN[J].Computer Engineering and Design, 2018, 39(12):3638-3642.(in Chinese) [17] 潘蕾娜, 陶洋, 许湘扬, 等.基于信任与能耗均衡的安全分簇路由协议[J].北京邮电大学学报, 2019, 42(3):29-36. PAN L N, TAO Y, XU X Y, et al.A secure clustering routing protocol based on trust and balancing energy consumption[J].Journal of Beijing University of Posts and Telecommunications, 2019, 42(3):29-36.(in Chinese) [18] 张光华, 杨耀红, 张冬雯, 等.物联网中基于信任抗丢包攻击的安全路由机制[J].计算机科学, 2019, 46(6):153-161. ZHANG G H, YANG Y H, ZHANG D W, et al.Secure routing mechanism based on trust against packet dropping attack in internet of things[J].Computer Science, 2019, 46(6):153-161.(in Chinese) [19] KALIDOSS T, RAJASEKARAN L, KANAGASABAI K, et al.QoS aware trust based routing algorithm for wireless sensor networks[J].Wireless Personal Communications, 2020, 110(4):1637-1658. [20] 冯聪, 赵炜, 杨余旺.一种针对虫洞攻击的安全路由方法[J].计算机工程, 2013, 39(9):186-188, 200. FENG C, ZHAO W, YANG Y W.A secure routing method for wormhole attack[J].Computer Engineering, 2013, 39(9):186-188, 200.(in Chinese) [21] 陈思, 张宏, 李华峰, 等.时延容忍传感器网络中抗黑洞攻击的安全路由协议[J].计算机工程, 2014, 40(11):121-125. CHEN S, ZHANG H, LI H F, et al.Security routing protocol resisting blackhole attack in delay-tolerant sensor network[J].Computer Engineering, 2014, 40(11):121-125.(in Chinese) [22] KUMAR N, SINGH Y.An energy efficient and trust management based opportunistic routing metric for wireless sensor networks[C]//Proceedings of the 4th International Conference on Parallel, Distributed and Grid Computing.Washington D.C., USA:IEEE Press, 2016:611-616. [23] PERKINS C E, ROYER E M.Ad-hoc On-demand Distance Vector Routing[C]//Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications.Washington D.C., USA:IEEE Press, 1999:90-100. |