Maarouf I, Baroudi U, Naseer A R. Cautious rating for trust-enabled routing in wireless sensor networks[J]. Eurasip Journal on Wireless Communications and Networking, 2009,1:1 16.
[2]
Karlof C, Wagner D. Secure routing in wireless sensor networks: attacks and countermeasures[J]. Ad Hoc Networks, 2003,1(2 3):293 315.
[3]
Yu Y, Govindan R, Estrin D. Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks . Los Angeles: University of California, 2001.
[4]
Perrig A, Szewczky R, Wen V, et al. SPINS: security protocols for sensor networks[J]. Wireless Networks, 2002,8(7):521 534.
[5]
Josang A, Haller J. Dirichlet reputation systems //Proceedings of The 2nd International Conference on Availability, Reliability and Security. Vienna: IEEE Computer Society, 2007: 112 119.
[6]
Thomas L S. The analytic hierarchy process: planning, priority setting, resource allocation[M]. New York: McGraw-Hill, 1980:79 97.