[1] F. Stann, J. Heidemann, R. Shroff,M. Z. Murtaza, “RBP: Robust Broadcast Propagation in Wireless Networks,” inProceedings of ACM SenSys, pp. 85-98, Boulder, Colorado, USA, 2006 [2] C. Hsu and C. Lin, “A Comparison of Methods for Multi-Class Support Vector Machines,” IEEE Transactions on Neural Networks, Vol. 13, No. 2, pp. 415-425, 2002 [3] X. Ren and S. Lv, “Analysis of ARP Protocol Deception Principle and Resistance Method,” Computer Engineering, Vol. 29, No. 3, pp. 127-129, 2003 [4] G. Chang and S. Chen, “An Efficient and Scalable Self-Organizing Neighborhood Fault Detection Protocol,” Journal of Electronic and Information Science, Vol. 32, No. 9, pp. 2145-2150, 2010 [5] I. Stojmenovic, D. Simplot-Ryl,A. Nayak, “Towards Scalable Cut and Link Detection with Applications in Wireless Ad Hoc Net-Works,” IEEE Transactions on Networks, Vol. 25, No. 1, pp. 44-48, 2011 [6] H. Peng, D. Zhao, Y. J. Yu, Z. D. Wu,S. Y. Wu,“Trust Model based on Trusted Computing for Distributed Heterogeneous Networks,” Computer Science, pp. 66-69, October 2016 [7] P. Nageshwar, I. Nagaraju,M. A. Kumar, “The Trusted Computing Model for Providing Security in Cloud Computing,” International Journal of Mathematics and Computer Research, Vol. 3, No. 6, pp. 1018-1024, 2015 [8] G. Proudler and L. Chen, “Trusted Platform Architecture,” Springer International Publishing, Vol. 2, pp. 109-111, 2014 [9] L. Huawei, “Research on Dependable Computing Oriented Distributed Fault Detection System,” Ph.D. Thesis. College of Computer Science of Chongqing University, pp. 54-60, April 2012 [10] C. Lin and X. Peng, “Research on Trustworthy Networks,”Chinese Journal of Computers, pp. 751-757, May 2005 [11] A. Tajeddine, A. Kayssi, A. Chehab,H. Artail, “A Comprehensive Reputation-based Trust Model for Distributed Systems,” inProceedings of Workshop of the 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks, pp. 116-125, IEEE, 2005 [12] L. Bhasker, “Genetically Derived Secure Cluster-based Data Aggregation in Wireless Sensor Network,” IET Information Security, Vol. 8, No. 1, pp. 1-7, 2014 |