[1] GUO J, CHEN I R, TSAI J J P. A survey of trust computation models for service management in Internet of things systems[J]. Computer Communications, 2017, 97(C):1-14. [2] WANG P, ZHANG P. A review on trust evaluation for Internet of things[C]//MobiMedia'16:Proceedings of the 9th EAI International Conference on Mobile Multimedia Communications. Brussels:ICST, 2016:34-39. [3] SICARI S, RIZZARDI A, GRIECO L A, et al. Security, privacy and trust in Internet of things:the road ahead[J]. Computer Networks, 2015, 76(C):146-164. [4] WHITMORE A, AGARWAL A, XU L D. The Internet of things-a survey of topics and trends[J]. Information Systems Frontiers, 2015, 17(2):261-274. [5] AROUCHA C, ABDELOUAHAB Z, LOPES D, et al. Adaptive security mechanism:a study on the different approaches to mobile devices[J]. Journal of Information Sciences and Computing Technologies, 2015, 2(2):147-153. [6] GHOSH S, SEETHARAMAN S. Mechanism for adaptive and context-aware inter-IoT communication[C]//ANTS 2015:Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommunications Systems. Piscataway, NJ:IEEE, 2016:1-6. [7] EL-MALIKI T, SEIGNEUR J M. Security adaptation based on autonomic and trust systems for ubiquitous mobile network and green IT[EB/OL].[2017-04-02]. http://iaria.org/conferences2013/awardsUBICOMM13/ubicomm2013_a6.pdf. [8] MAURO A D, FAFOUTIS X, DRAGONI N. Adaptive security in ODMAC for multihop energy harvesting wireless sensor networks[J]. International Journal of Distributed Sensor Networks, 2015, 2015(3):1-10. [9] FERNANDEZ-GAGO C, MOYANO F, LOPEZ J. Modelling trust dynamics in the Internet of things[J]. Information Sciences, 2017, 396(8):72-82. [10] MOUSA H, MOKHTAR S B, HASAN O, et al. Trust management and reputation systems in mobile participatory sensing applications:a survey[J]. Computer Networks, 2015, 90(C):49-73. [11] HE D, CHAN S, GUIZANI M. User privacy and data trustworthiness in mobile crowd sensing[J]. IEEE Wireless Communications, 2015, 22(1):28-34. [12] JIANG J, HAN G, WANG F, et al. An efficient distributed trust model for wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26(5):1228-1237. [13] BHARGAVI S, GORANTHALA V P. The impact of collusion attacks in WSN with secure data aggregation system[J]. Neuropathology, 2015, 31(6):648-653. [14] 房卫东, 石志东, 单联海, 等. 一种基于BETA分布抗On-off攻击的信任机制[J].系统仿真学报,2015,27(11):2722-2728.(FANG W D, SHI Z D, SHAN L H, et al. Trusted scheme for defending On-off attack based on BETA distribution[J]. Journal of System Simulation, 2015, 27(11):2722-2728.) [15] 李姗姗.基于监督机制的WSN安全数据融合算法设计[D].沈阳:东北大学,2011:19-40.(LI S S. Design of secure data aggregation algorithm based on monitoring mechanism in WSN[D]. Shenyang:Northeastern University, 2011:19-40.) [16] MENDOZA C V L, KLEINSCHMIDT J H. Mitigating On-off attacks in the Internet of things using a distributed trust management scheme[J]. International Journal of Distributed Sensor Networks, 2015, 2015(11):1-8. [17] 胡蓉华,董晓梅,王大玲. 一种信任和能量意识的WSN补救路由算法[J].控制与决策,2016,31(3):435-440.(HU R H, DONG X M, WANG D L. A trust and energy aware remedy routing algorithm for wireless sensor networks[J]. Control and Decision, 2016,31(3):435-440.) [18] THOMSON C, ROMDHANI I, AL-DUBAI A, et al, Cooja Simulator Manual[EB/OL]. (2016-06)[2017-04-11]. https://www.researchgate.net/publication/304572240_Cooja_Simulator_Manual. [19] BERGMANN O. Tinydtls:a library for datagram transport layer security[EB/OL]. (2016-02-11)[2017-04-18]. https://sourceforge.net/projects/tinydtls/. |