|
F. Bao, R. Chen, M. J. Chang, et al. “Trust-based Intrusion Detection in Wireless Sensor Networks” [A]. 2011 IEEE International Conference on Communications (ICC)[C]. Kyoto, Japan, 2011.1-6.
|
|
K. Bloede, G. Mischou, A. Senan, and R. Koontz, “The Internet of Things,” Available at http://www.woodsidecap.com/wp-content/uploads/2015/03/WCP- IOT- M and A- REPORT- 2015-3.pdf, Last accessed:2016-10-27.
|
|
G. V. Crosby, L. Hester, and N. Pissinou, “Location-aware, Trust-based detection and Isolation of Compromised Nodes in Wireless Sensor Networks” [J]. International Journal Network Security, 2011, 12(2): 107- 117.
|
|
I. R. Chen, F. Bao, and J. Guo, “Trust-based Service Management for Social Internet of Things Systems,” IEEE Trans. Dependable Secur. Dependable Secur. Comput., vol. 5971, no. c, pp. 1–1, 2015.
|
|
X. H. Gong. “Research on Secure Clustering Mechanism of IoT-aware Nodes Based on Trust” [D]. Chongqing: Chongqing University of Posts and Telecommunications, 2014.
|
|
A. J?sang, “A Logic for Uncertain Probabilities,” International Journal of Uncertainty, Fuzziness and Knowledge-based Systems, vol. 9, pp.279–311, 2001.
|
|
B. B. Liu, X. H. Gong. “Trust Assessment Method Based on IoT Node Behavior Detection” [J]. Journal of Communications, 2014,35 (5): 8-15.
|
|
W. M. Liu, L. H. Yin, B. X. Fang and so on.” Study on the Trust Mechanism Under the Internet of Things” [J]. Chinese Journal of Computers, 2012,35 (5): 847-855.
|
|
Y. B. Liu, W. P. Hu “Internet of Things Security Model and Key Technologies” [J]. Digital Communications, 010, 37 (4): 28-33,2010.
|
|
M. Nitti, R. Girau, and L. Atzori, “Trustworthiness Management in the Social Internet of Things,” IEEE Trans. Knowl. Data Eng., vol. 26, no. 5, pp. 1253–1266, 2014.
|
|
ROMANA. R, ZHOUA. J, LOPEZB. J. “On the Features and Challenges of Security & Privacy in Distributed Internet of Things” [J]. Computer Networks, 2013, 57 (10):2266-2279.
|
|
Srinivas Mukkamala, Andrew H. Sung. “Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques” [J], International Journal of Digital Evidence, Winter 2003,4:63-69.
|
|
H. Xu. “Research on the Trust Model of Internet of Things Based on Clustering” [D]. Lanzhou traffic University, 2017.
|
|
J. You, Shangguan Lun, Xu Shoukun, et al. “A Distributed Dynamic Trust Management Model Considering Trust Reliability” [J]. Journal of Software, 2017.
|
|
A. K. Zeeshan, H. Peter, “A Trust Based Distributed Intrusion Detection Mechanism for Internet of Things”, In 2017 IEEE 31st International Conference on Advanced Information Networking and Applications. IEEE, 2017, pp.1169-1176
|