Computer Science ›› 2014, Vol. 41 ›› Issue (7): 162-166.doi: 10.11896/j.issn.1002-137X.2014.07.033
Previous Articles Next Articles
FANG Fang,LI Jing-feng and LI Jie
[1] 杨庚,陈伟,曹晓梅.无线传感器网络安全[M].北京:科学出版社,2010 [2] Carruthers R,Nikolaidis I.Certain limitations of reputation-based schemes in mobile environments[C]∥Proc of the 8th ACM international symposium Symposium on MSWiM.2005:2-11 [3] Sen J,Chowdhury P R,Senfupta I.A Distributed Trust Establishment Scheme for Mobile Ad hoc Networkss[C]∥Proc of International Conference on Computing:Theory and Applications.2007:51-58 [4] Ozdemir S.Functional reputation based data aggregation forwireless sensor networks[C]∥Proc of IEEE International Conference on Wireless and Mobile Computing,Networking and Communications.Avignon,France,2008:592-597 [5] Raha A,Naskar M K,Chakraborty A.A Novel Indirect Trust based Link State Routing Scheme using a Robust Route Trust Method for Wireless Sensor Networks[C]∥Proc of International Conference on Mobility and Security.Istanbul,Turkey,May 2012:1-5 [6] Ganeriwal S,Srivastava M.Reputation based framework forhigh integrity sensor networks[C]∥Proc of the 2nd ACM Workshop on Security of Ad hoc and Sensor networks.Was-hington D C,2004:66-77 [7] Ganeriwal S,Balzano L K,Srivastava M.Reputation basedframe-work for high integrity sensor networks[J].ACM Transactions on Sensor Networks,2008,4(3):1-37 [8] 杨光,印桂生,杨武,等.无线传感器网络基于节点行为的信誉评测模型[J].通信学报,2009,30(12):18-26 [9] Marina M K,Das S R.On demand multipath distance vector routing for ad hoc networks[C]∥Proceedings of IEEE International Conference on Network Protocols.Vancouver,Canada:IEEE Computer Society Press,2001:14-23 [10] Frideman E,Resnick P.The social cost of cheap pseudonyms[J].Journal of Economics and Management Strategy,2001,10(2):177-199 [11] Hani A.Secure data aggregation in wireless sensor networks[D].Queensland University,2011 |
No related articles found! |
|