[1] ASLAN E,KAYAASLAN E.Security in wireless sensor networks:a survey[EB/OL].[2019-12-28].https://www.researchgate.net/publication/267939946_Security_in_Wireless_Sensor_Networks_A_Survey. [2] PATEL S,NITAL M.A survey:lightweight cryptography in WSN[C]//Proceedings of 2015 International Conference on Communication Networks.Washington D.C.,USA:IEEE Press,2015:21-27. [3] SAHINGOZ O K.Large scale wireless sensor networks with multi-level dynamic key management scheme[J].Journal of Systems Architecture,2013,59(9):801-807. [4] ISHMANOV F,KIM S W,NAM S Y.A secure trust establishment scheme for wireless sensor networks[J].Sensors,2014,14(1):1877-1897. [5] ISHMANOV F,KIM S W,NAM S Y.A robust trust establishment scheme for wireless sensor networks[J].Sensors,2015,15(3):7040-7061. [6] MEULENAER G D,GOSSET F,STANDAERT F X,et al.On the energy cost of communication and cryptography in wireless sensor networks[C]//Proceedings of 2008 IEEE International Conference on Wireless and Mobile Computing,Networking and Communications.Washington D.C.,USA:IEEE Press,2008:580-585. [7] HE D J,GAO Y,CHAN S,et al.An enhanced two-factor user authentication scheme in wireless sensor networks[J].Ad Hoc & Sensor Wireless Networks,2010,10(4):361-371. [8] REBAHI Y,MUJICA V E,SISALEM D.A reputation-based trust mechanism for ad hoc networks[C]//Proceedings of the 10th IEEE Symposium on Computers and Communications.Washington D.C.,USA:IEEE Press,2005:32-39. [9] TALBI S,KOUDIL M,BOUABDALLAH A,et al.Adaptive and dual data-communication trust scheme for clustered wireless sensor networks[J].Telecommunication Systems,2017,65(4):605-619. [10] BAO F Y,CHEN I R,CHANG M J,et al.Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection[J].IEEE Transactions on Network and Service Management,2012,9(2):169-183. [11] FENG Renjian,HAN Xiaona,LIU Qiang,et al.A credible Bayesian-based trust management scheme for wireless sensor networks[J].International Journal of Distributed Sensor Networks,2015,11(2):1-9. [12] LIM H S,MOON Y S,BERTINO E.Provenance-based trustworthiness assessment in sensor networks[C]//Proceedings of the 7th International Workshop on Data Management for Sensor Networks.[S.l.]:[s.n.],2010:2-7. [13] SAFA H,ARTAIL H,TABET D.A cluster-based trust-aware routing protocol for mobile ad hoc networks[J].Wireless Networks,2010,16(4):969-984. [14] CHO J H,SWAMI A,CHEN R.Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks[J].Journal of Network and Computer Applications,2012,35(3):1001-1012. [15] LIU Chenxu,LIU Yun,ZHANG Zhenjiang.Improved reliable trust-based and energy-efficient data aggregation for wireless sensor networks[J].International Journal of Distributed Sensor Networks,2013,9(5):27-35. [16] YE Zhengwang,WEN Tao,LIU Zhenyu,et al.An efficient dynamic trust evaluation model for wireless sensor networks[EB/OL].[2019-12-28].https://www.hindawi.com/journals/js/2017/7864671/. [17] WON J,BERTINO E.Distance-based trustworthiness assessment for sensors in wireless sensor networks[C]//Proceedings of 2015 International Conference on Network and System Security.Berlin,Germany:Springer,2015:18-31. [18] FU Rongrong.Research on key techonlogies of intrusion detection for wireless sensor network[D].Beijing:Beijing Jiaotong University,2013.(in Chinese)傅蓉蓉.无线传感器网络入侵检测关键技术研究[D].北京:北京交通大学,2013. [19] GAO Fei,ZHU Wentao.A dual-head cluster based secure aggregation scheme for sensor networks[C]//Proceedings of 2008 IFIP International Conference on Network and Parallel Computing.Washington D.C.,USA:IEEE Press,2008:103-110. [20] WEI Huaichao.Research of data aggregation based on dual-head cluster and trust mechanism in wireless sensor networks[D].Shenyang:Liaoning University,2016.(in Chinese)韦怀超.无线传感网基于双簇头信任机制数据融合的研究[D].沈阳:辽宁大学,2016. [21] FU Junsong,LIU Yun.Double cluster heads model for secure and accurate data fusion in wireless sensor networks[J].Sensors,2015,15(1):2021-2040. [22] JIANG Jinfang,HAN Guangjie,WANG Feng,et al.An efficient distributed trust model for wireless sensor networks[J].IEEE Transactions on Parallel and Distributed Systems,2014,26(5):1228-1237. [23] HAJIBABAEI F,YAGHMAE M H.Proposing a centralized trust management system to detect compromised node in WSN[C]//Proceedings of 2013 International Conference on Computer and Knowledge Engineering.Washington D.C.,USA:IEEE Press,2013:51-57. [24] YU Yanli,LI Keqiu,ZHOU Wanlei,et al.Trust mechanisms in wireless sensor networks:attack analysis and countermeasures[J].Journal of Network and Computer Applications,2012,35(3):867-880. [25] LEI Jianjun,BI Haiyang,XIA Ying,et al.An in-network data cleaning approach for wireless sensor networks[J].Intelligent Automation and Soft Computing,2016,22(4):599-604. [26] MADDEN S.Intel lab data[EB/OL].[2019-12-28].http://db.csail.mit.edu/labdata/labdata.html. [27] HEINZELMAN W R,CHANDRAKASAN A,BALAKRISHNAN H.Energy-efficient communication protocol for wireless microsensor networks[C]//Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.Washington D.C.,USA:IEEE Press,2000:31-36. |