A security model for wireless sensor networks
暂无分享,去创建一个
[1] Gregorio Martínez Pérez,et al. Providing trust in wireless sensor networks using a bio-inspired technique , 2011 .
[2] Thomas Stützle,et al. Ant colony optimization: artificial ants as a computational intelligence technique , 2006 .
[3] Félix Gómez Mármol,et al. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.
[4] C. Badcock,et al. Trust : making and breaking cooperative relations , 1989 .
[5] Salil S. Kanhere,et al. Authentication and Confidentiality in Wireless Ad Hoc Networks , 2009 .
[6] H. Marzi. Sensor fusion and use of reconfigurable neural networks in condition monitoring , 2005, CIMSA. 2005 IEEE International Conference on Computational Intelligence for Measurement Systems and Applications, 2005..
[7] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[8] Diego Gambetta. Can We Trust Trust , 2000 .
[9] Edgar H. Callaway,et al. Wireless Sensor Networks: Architectures and Protocols , 2003 .
[10] S. Marti,et al. Taxonomy of trust : Categorizing P 2 P reputation systems q , 2005 .
[11] Junping Du,et al. LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.
[12] Hosein Marzi,et al. An Enhanced Bio-inspired Trust and Reputation Model for Wireless Sensor Network , 2013, ANT/SEIT.
[13] F. G. Marmol,et al. TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.
[14] Chrysanthos Dellarocas,et al. Analyzing the economic efficiency of eBay-like online reputation reporting mechanisms , 2011, EC '01.
[15] William S. Hortos. Bio-inspired, cross-layer protocol design for intrusion detection and identification in wireless sensor networks , 2012, 37th Annual IEEE Conference on Local Computer Networks - Workshops.
[16] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[17] Roberto Uribeetxeberria,et al. Reputation-based Intrusion Detection System for wireless sensor networks , 2012, 2012 Complexity in Engineering (COMPENG). Proceedings.
[18] Hosein Marzi. Modular Neural Network Architecture for Precise Condition Monitoring , 2008, IEEE Transactions on Instrumentation and Measurement.
[19] Jie Wu,et al. Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .
[20] Leonidas J. Guibas,et al. Wireless sensor networks - an information processing approach , 2004, The Morgan Kaufmann series in networking.
[21] Cem Ersoy,et al. Wireless sensor networks for healthcare: A survey , 2010, Comput. Networks.
[22] Ace Dimitrievski,et al. Security Issues and Approaches in WSN , 2009 .
[23] Loren Schwiebert,et al. Introduction to Wireless Sensor Networking , 2005, Handbook of Sensor Networks.