Author:
Sahoo Rashmi Ranjan,Ray Sudhabindu,Sarkar Souvik,Bhoi Sourav Kumar
Publisher
Springer Science and Business Media LLC
Reference27 articles.
1. Wang, Y.; Attebury, G.; Ramamurthy, B.: A survey of security issues in wireless sensor networks. IEEE Commun. Surv. Tutor. 8(2), 2–23 (2006)
2. Osman, K.; Samee, U.K.; Sajjad, A.M.; et al.: Comparative study of trust and reputation systems for wireless sensor networks. Secur. Commun. Netw. 6(6), 669–688 (2013)
3. Lopez, J.; Roman, R.; Agudo, I.; Fernandez-Gago, C.: Trust management systems for wireless sensor networks: best practices. Comput. Commun. 33(9), 1086–1093 (2010)
4. Lu, Y.; Lin, K.; Li, K.: Trust evaluation model against insider attack in wireless sensor networks. In: IEEE Second International Conference on Cloud and Green Computing (CGC), pp. 319–326 (2012)
5. Yan, S.; Zhu, H.; Ray, L.K.J.: Defense of trust management vulnerabilities in distributed networks. IEEE Commun. Mag. 46(4), 112–119 (2008)
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献