Naif Alsharabi,Li Ren Fa,Fan Zing.Wireless sensor networks of battlefields hotspot challenges and solutions [J]. IEEE Transaction on Mobile Computering,2007,6(1):554-562.
[2]
Blaze M,Feigenbaum J.Decentralized trust management .Dale J.Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy .IEEE,NJ,United States,1996.164-173.
[3]
Rebahi Y,Mujica-V V E,Sisalem D A.Republican-based trust mechanism for Ad hoc network .R Ammar Reda Ammar Proceedings of the 10th IEEE Symposium on Computers and Communications .San Francisco:IEEE,2005.37-42.
[4]
蔡绍滨,方伟.基于区间的云相似度比较算法[J].小型微型计算机,2011,32(12):2456-2460. Cai Shaobin,Fang Wei.Research of interval-based cloud similarity comparison algorithm[J].Journal of Chinese Computer Systems,2011,32(12):2456-2460.(in Chinese)
[5]
吕辉军,李德毅,王晔.逆向云在定性评价中的应用[J].计算机学报,2003,26(8):1010-1019. Lv Huijun,Li Deyi,Wang Ye.The application of Backward Cloud in Qualitative Evaluation[J].Chinese Journal of Computers,2011,32(12):2456-2460.(in Chinese)
[6]
Bin Ma.Cross-layer trust model and algorithm of node selection in wireless sensor networks .Desheng Wen.The 2009 International Conference on Communication Software and Networks .Washington,DC,USA,2009.45-60.
[7]
Song S,Wang K.Trusted P2P transactions with fuzzy reputation aggregation [J].IEEE Internet Computing,2005,9(6):24-34.
[8]
Grandison T,Sloman M.A survey of trust in internet applications[J].IEEE Communications Surveys,2000,14(8):114-128.
[9]
Saurabh Ganeriwal,Mani B.Srivastava.Reputation-based framework for high integrity sensor network .Sanjeev Setia.Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Network .NY:ACM,2004.66-77.
[10]
王建新,张亚男,王伟平,卢锡城.移动自组网中基于声誉机制的安全路由协议设计与分析 .电子学报,2005,33(4):596-601. Wang Jianxin,Zhang Yanan,Wang Weipin,Lu Xicheng.A security routing protocol based on reputation systems in MANET[J].Acta Electronica Sinica,2005,33(4):596-601.(in Chinese)
[11]
Sapon T,Pinalkumar D,Rohan B.Location-centric isolation of misbehavior and trust routing in energy-constrained sensor networks .Mohamed Eltoweissy.Proceedings of the IEEE Workshop on Energy-Efficient Wireless Communications and Networks .Arizona:IEEE,2004.463-469.
[12]
冯健昭,肖德琴,杨波.基于β分布的无线传感器网络信誉系统[J].计算机应用,2007,27(1):111-113. Feng Jianzhao,Xiao Deqin,Yang Bo.Reputation system for wireless sensor networks based on β distribution [J].Journal of Computer Applications.2007,27(1):111-113.(in Chinese)
[13]
肖德琴,冯健昭,周权等.基于高斯分布的传感器网络信誉模型[J].通信学报,2008,29(3):47-53. Xiao Deqin,Feng Jianzhao,Zhou Quan.Gauss reputation framework for sensor networks[J].Journal on Communications,2008,29(3):47-53.(in Chinese)
[14]
Dai Hongjun,Jia Zhiping,Dong Xiaona.An entropy-based trust modeling and evaluation for wireless sensor networks .Xingshe Zhou.The 2008 International Conference on Embedded Software and Systems .San Francisco:IEEE,2008.134-146.
[15]
李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):16-21. Li Deyi,Meng Haijun,Shi Xuemei.Membership clouds and membership cloud generator[J].Journal of Computer Research and Development.1995,32(6):16-21.(in Chinese)
[16]
Li D Y,Cheng D W,Shi X M.Uncertainty reasoning based on cloud models in controllers [J].Computers and Mathematics with Applications,1998,35(3):99-123.
[17]
Li D Y,Han J W,Shi XM.Knowledge representation and discovery based on linguistic atoms [J].Knowledge-based System,1998,10(37):431-440.
[18]
Yan Sun,Zhu Han,Liu,K J R.Defense of trust management vulnerabilities in distributed networks [J].IEEE Communications Magazine,2008,2(46):112-119.