| 1 | JENSEN C D. The role of trust in computer security[C]// Proceedings of the 10th Annual International Conference on Privacy, Security and Trust. Piscataway: IEEE, 2012: 236-236.  10.1109/pst.2012.6297950 | 
																													
																						| 2 | XU X L, LIU X H, XU Z Y, et al. Trust-oriented IoT service placement for smart cities in edge computing [J]. IEEE Internet of Things Journal, 2020, 7(5): 4084-4091.  10.1109/jiot.2019.2959124 | 
																													
																						| 3 | 邓晓衡,关培源,万志文,等. 基于综合信任的边缘计算资源协同研究[J]. 计算机研究与发展, 2018, 55(3): 449-477.  10.7544/issn1000-1239.2018.20170800 | 
																													
																						|  | DENG X H, GUAN P Y, WAN Z W, et al. Integrated trust based resource cooperation in edge computing [J]. Journal of Computer Research and Development, 2018, 55(3): 449-477.  10.7544/issn1000-1239.2018.20170800 | 
																													
																						| 4 | CHEN I R, GUO J, WANG D C, et al. Trust-based service management for mobile cloud IoT systems [J]. IEEE Transactions on Network and Service Management, 2019, 16(1): 246-263.  10.1109/tnsm.2018.2886379 | 
																													
																						| 5 | 任彦冰,李兴华,刘海,等. 基于区块链的分布式物联网信任管理方法研究[J]. 计算机研究与发展, 2018, 55(7): 1462-1478.  10.7544/issn1000-1239.2018.20180073 | 
																													
																						|  | REN Y B, LI X H, LIU H, et al. Blockchain-based trust management framework for distributed Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1462-1478.  10.7544/issn1000-1239.2018.20180073 | 
																													
																						| 6 | 魏新艳,张琳. 物联网中基于信任的频谱资源分配机制[J]. 计算机工程, 2020, 46(4): 26-32, 39. | 
																													
																						|  | WEI X Y, ZHANG L. Trust-based spectrum resource allocation mechanism in Internet of Things[J]. Computer Engineering, 2020, 46(4): 26-32, 39. | 
																													
																						| 7 | 刘文懋,殷丽华,方滨兴,等. 物联网环境下的信任机制研究[J]. 计算机学报, 2012, 35(5): 846-855.  10.3724/sp.j.1016.2012.00846 | 
																													
																						|  | LIU W M, YIN L H, FANG B X, et al. A hierarchical trust model for the Internet of Things[J]. Chinese Journal of Computers, 2012, 35(5): 846-855.  10.3724/sp.j.1016.2012.00846 | 
																													
																						| 8 | RIAHI SFAR A, NATALIZIO E, CHALLAL Y, et al. A roadmap for security challenges in the Internet of Things[J]. Digital Communications and Networks, 2018, 4(2): 118-137.  10.1016/j.dcan.2017.04.003 | 
																													
																						| 9 | CHEN D, CHANG G R, SUN D W, et al. TRM-IoT: a trust management model based on fuzzy reputation for Internet of Things[J]. Computer Science and Information Systems, 2011, 8(4): 1207-1228.  10.2298/csis110303056c | 
																													
																						| 10 | SAIED Y BEN, OLIVEREAU A, ZEGHLACHE D, et al. Trust management system design for the Internet of Things: a context-aware and multi-service approach [J]. Computers and Security, 2013, 39(Pt B): 351-365.  10.1016/j.cose.2013.09.001 | 
																													
																						| 11 | KANG K, PANG Z B, XU L D, et al. An interactive trust model for application market of the Internet of Things[J]. IEEE Transactions on Industrial Informatics, 2014, 10(2): 1516-1526.  10.1109/tii.2014.2306799 | 
																													
																						| 12 | 张光华,杨耀红,张冬雯,等. 物联网中基于信任抗丢包攻击的安全路由机制[J]. 计算机科学, 2019, 46(6): 153-161.  10.11896/j.issn.1002-137X.2019.06.023 | 
																													
																						|  | ZHANG G H, YANG Y H, ZHANG D W, et al. Secure routing mechanism based on trust against packet dropping attack in Internet of Things[J]. Computer Science, 2019, 46(6): 153-161.  10.11896/j.issn.1002-137X.2019.06.023 | 
																													
																						| 13 | CHEN I R, GUO J, BAO F Y. Trust management for SOA-based IoT and its application to service composition[J]. IEEE Transactions on Services Computing, 2016, 9(3): 482-495.  10.1109/tsc.2014.2365797 | 
																													
																						| 14 | CHEN I R, BAO F Y, GUO J. Trust-based service management for social Internet of Things systems [J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(6): 684-696.  10.1109/tdsc.2015.2420552 | 
																													
																						| 15 | 刘宴兵,龚雪红,冯艳芬. 基于物联网节点行为检测的信任评估方法[J]. 通信学报, 2014, 35(5): 8-15.  10.3969/j.issn.1000-436x.2014.05.002 | 
																													
																						|  | LIU Y B, GONG X H, FENG Y F. Trust system based on node behavior detection in internet of things [J]. Journal on Communications, 2014, 35(5): 8-15.  10.3969/j.issn.1000-436x.2014.05.002 | 
																													
																						| 16 | AL-HAMADI H, CHEN I R. Trust-based decision making for health IoT systems [J]. IEEE Internet of Things Journal, 2017, 4(5): 1408-1419.  10.1109/jiot.2017.2736446 | 
																													
																						| 17 | 张琳,魏新艳,刘茜萍,等. 基于协作信誉和设备反馈的物联网边缘服务器信任评估算法[J]. 通信学报, 2022, 43(2): 118-130.  10.11959/j.issn.1000-436x.2022024 | 
																													
																						|  | ZHANG L, WEI X Y, LIU X P, et al. Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback [J]. Journal on Communications, 2022, 43(2): 118-130.  10.11959/j.issn.1000-436x.2022024 | 
																													
																						| 18 | 谢丽霞,魏瑞炘. 物联网节点动态信任度评估方法[J]. 计算机应用, 2019, 39(9): 2597-2603.  10.11772/j.issn.1001-9081.2019020315 | 
																													
																						|  | XIE L X, WEI R X. Dynamic trust evaluation method for IoT nodes [J]. Journal of Computer Applications, 2019, 39(9): 2597-2603.  10.11772/j.issn.1001-9081.2019020315 | 
																													
																						| 19 | ElSALAMOUNY E, KRUKOW K T, SASSONE V. An analysis of the exponential decay principle in probabilistic trust models [J]. Theoretical Computer Science, 2009, 410(41): 4067-4084.  10.1016/j.tcs.2009.06.011 | 
																													
																						| 20 | ADEWUYI A A, CHENG H, SHI Q, et al. CTRUST: a dynamic trust model for collaborative applications in the Internet of Things[J]. IEEE Internet of Things Journal, 2019, 6(3): 5432-5445.  10.1109/jiot.2019.2902022 | 
																													
																						| 21 | REDDY V B, NEGI A, VENKATARAMAN S, et al. A similarity based trust model to mitigate badmouthing attacks in Internet of Things (IoT)[C]// Proceedings of IEEE 5th World Forum on Internet of Things. Piscataway: IEEE, 2019:278-282.  10.1109/wf-iot.2019.8767170 | 
																													
																						| 22 | GARCIA S, PARMISANO A, ERQUIAGA M J. IoT-23: a labeled dataset with malicious and benign IoT network traffic [DS/OL] . [2022-07-15] .. |