共 27 条
[11]
Handy M., Haase M., Timmermann D., Low energy adaptive clustering hierarchy with deterministic cluster-head selection, Proceedings of the Fourth Ieee Conference on Mobile and Wireless Communications Networks, pp. 368-372, (2002)
[12]
He X., Gui X., Wei W., A heider-theory based reputation framework for wsn, 10th Ieee International Conference on High Performance Computing and Communications, pp. 635-640, (2008)
[13]
Jamont J.-P., Occello M., A multiagent tool to simulate hybrid real/virtual embedded agent societies, Proceedings of the Ieee/wic/acm Conference on Intelligent Agent Technology, pp. 501-504, (2009)
[14]
Jamont J.-P., Occello M., Lagreze A., A multiagent approach to manage communication in wireless instrumentation systems, Measurement, 43, 4, pp. 489-503, (2010)
[15]
Kifayat K., Merabti M., Shi Q., Llewellyn-Jones D., An efficient algorithm to detect faulty reading in wireless sensor network using the concept of reputation, International Conference on Network and Service Security, pp. 1-5, (2009)
[16]
Lewis N., Foukia N., Govan D.G., Using trust for key distribution and route selection in wireless sensor networks, Ieee/ifip Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, pp. 787-790, (2008)
[17]
Liu T., Zhou M.-Z., Implementing a trust-aware routing protocol in wireless sensor nodes, Ieee International Conference on Progress in Informatics and Computing (Pic), pp. 556-559, (2010)
[18]
Ma B., A novel stereoscopic security architecture with trust management for wireless sensor networks, Proceedings of the 2009 International Conference on Communication Software and Networks, pp. 797-800, (2009)
[19]
Noergaard T., Embedded Systems Architecture: A Comprehensive Guide for Engineers and Programmers, (2005)
[20]
Pei Q., Wang L., Yin H., Pang L., Tang H., Layer key management scheme on wireless sensor networks, Proceedings of the Fifth International Conference on Information Assurance and Security, pp. 427-431, (2009)