[1] ATZORI L, IERA A, MORABITO G. The internet of things: a survey[J]. Computer Networks, 2010(54): 2787-2805.
[2] 胡向东.物联网研究与发展综述[J].数字通信,2010,37(2):17-21. HU Xiang-dong. Advance in research and development on the internet of things[J]. Digital Communication, 2010, 37(2): 17-21.(in Chinese)
[3] 宋亚辉,李凤保,李在铭.无线传感器网络能效技术综述[J].仪器仪表学报,2006,27(6):1665-1674. SONG Ya-hui, LI Feng-bao, LI Zai-ming. Survey on energy-efficiency technology for wireless sensor networks[J]. Chinese Journal of Scientific Instrument, 2006, 27(6): 1665-1674.(in Chinese)
[4] 唐 慧,胡向东.无线传感器网络数据融合研究综述[J].信息安全与通信保密,2007(7):62-64,68. TANG Hui, HU Xiang-dong. The research overview of data fusion in WSN[J]. Information Security and Communications Privacy, 2007(7): 62-64, 68.(in Chinese)
[5] KUMAR D, ASERI T C, PATEL R B. Energy efficient clustering and data aggregation protocol for heterogeneous wireless sensor networks[J]. International Journal of Computers, Communications and Control, 2011, 5(1): 113-124.
[6] 周鸣争,楚 宁,周 涛,等.一种基于能量约束的传感器网络动态数据融合算法[J].仪器仪表学报,2007,28(1):172-175. ZHOU Ming-zheng, CHU Ning, ZHOU Tao, et al. Dynamic data fusion algorithm based on energy restraining in sensor network[J]. Chinese Journal of Scientific Instrument, 2007, 28(1): 172-175.(in Chinese)
[7] GUO Jiang-hong, LUO Yu-dong. Probabilistic transmitting-based data aggregation scheme for wireless sensor networks[C]∥IEEE. Proceedings of the 2nd International Conference on Systems Engineering and Modeling. Paris: IEEE, 2013: 976-979.
[8] MARAIYA K, KANT K, GUPTA N. Wireless sensor network: a review on data aggregation[J]. International Journal of Scientific and Engineering Research, 2011, 2(4): 1-6.
[9] 赦文江,武 捷.物联网技术安全问题探析[J].信息网络安全,2010(1):49-50. HAO Wen-jiang, WU Jie. Research on security of the internet of things[J]. Netinfo Security, 2010(1): 49-50.(in Chinese)
[10] 田俊峰,鲁玉臻,李 宁.基于推荐的信任链管理模型[J].通信学报,2011,32(10):1-9. TIAN Jun-feng, LU Yu-zhen, LI Ning. Trust chain management model based on recommendation[J]. Journal on Communications, 2011, 32(10): 1-9.(in Chinese)
[11] 陈 晶,杜瑞颖,王丽娜,等.网络环境下一种基于概率密度的信任博弈模型[J].电子学报,2010,38(2):427-433. CHEN Jing, DU Rui-ying, WANG Li-na, et al. A trust game method basing on probability model in networks[J]. Acta Electronica Sinica, 2010, 38(2): 427-433.(in Chinese)
[12] CHEN Dong, CHANG Gui-ran, SUN Da-wei, et al. TRM-loT: a trust management model based on fuzzy reputation for internet of things[J]. Computer Science and Information Systems, 2011, 8(4): 1207-1228.
[13] CEOLIN D, HAGE W R, FOKKINK W. A trust model to estimate the quality of annotations using the web[C]∥ACM. 2010 Web Science Conference. Raleigh: ACM, 2010: 1-8.
[14] 刘文懋,殷丽华,方滨兴,等.物联网环境下的信任机制研究[J].计算机学报,2012,35(5):847-855. LIU Wen-mao, YIN Li-hua, FANG Bin-xing, et al. A hierarchical trust model for the internet of things[J]. Chinese Journal of Computers, 2012, 35(5): 847-855.(in Chinese)
[15] 袁禄来,曾国荪,姜黎立,等.网格环境下基于信任模型的动态级调度[J].计算机学报,2006,29(7):1217-1224. YUAN Lu-lai, ZENG Guo-sun, JIANG Li-li, et al. Dynamic level scheduling based on trust model in grid computing[J]. Chinese Journal of Computers, 2006, 29(7): 1217-1224.(in Chinese)
[16] FANG Hui, ZHANG Jie, THALMANN N M. A trust model stemmed from the diffusion theory for opinion evaluation[C]∥IEEE. Proceedings of the 12th International Conference on Autonomous Agents and Multi-agent Systems. Saint Paul: IEEE, 2013: 1-8.
[17] KIM H, LEE H, KIM W, et al. A trust evaluation model for QoS guarantee in cloud systems[J]. International Journal of Grid and Distributed Computing, 2010, 3(1): 1-9.