[1] Akyildiz, I.F., Su, W., Sankarasubramaniam, Y. and Cayirci, E. (2002) Wireless Sensor Networks: A Survey. Computer Networks, 38, 393-422.
http://dx.doi.org/10.1016/S1389-1286(01)00302-4
[2] Culler, D., Estrin, D. and Srivastava M. (2004) Overview of Sensor Networks. IEEE Computer Society, August 2004.
[3] Chintalapudi, K., Fu, T., Paek, J., Kothari, N., Rangwala, S., Caffrey, J., Govindan, R., Johnson, E. and Masri, S. (2006) Monotoring Civil Structures with a Wireless Sensor Network. IEEE Internet Computing, 10, 26-34.
http://dx.doi.org/10.1109/MIC.2006.38
[4] Mainwaring, et al. (2002) Wireless Sensor Networks for Habitat Monotoring. International Workshop on Wireless Sensor Networks and Applications (ACM).
http://dx.doi.org/10.1145/570738.570751
[5] Karlof, C. and Wagner, D. (2003) Secure Routing in Sensor Networks: Attacks and Countermeasures. First IEEE International Workshop on Sensor Network Protocols and Applications.
[6] Perrig, A., Zewczyk, R., Wen, V., Culler, D. and Tygar, D. (2002) SPINS: Secirity Protocols for Sensor Networks. Wireless Networks, 8, 521-534.
http://dx.doi.org/10.1023/A:1016598314198
[7] Shaikh, R.A., Lee, S., Khan, M.A.U. and Song, Y.J. (2006) LSec: Lightweight Security Protocol for Distributed Wireless Sensor Network. Proceedings of 11th IFIP International Conference on Personal Wireless Communication (PWC’06), Spain, September 2006.
[8] Zhang, Y., Liu, W., Lou, W. and Fang, Y. (2006) Location-Based Compromise Tolerant Security Mechanisms for Wireless Sensor Networks. IEEE Journal on Selected Areas in Communications, 24, 247-260.
http://dx.doi.org/10.1109/JSAC.2005.861382
[9] Karlof, C., Sastry, N. and Wagner, D. (2004) TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems, Baltimore, 162-175.
http://dx.doi.org/10.1145/1031495.1031515
[10] Zahariadis, T., Leigou, H.C., Trakadas, P. and Voliotis, S. (2010) Mobile Networks: Trust Management in Wireless Sensor Networks. European Transactions on Telecommunications, 21, 386-395.
[11] Sun, Y., Han, Z. and Liu, K.J.R. (2008) Defense of Trust Management Vulnerabilities in Distributed Networks. IEEE Communications Magazine, 46, 112-119.
[12] Saraogi, M. (2005) Security in Wireless Sensor Networks. Department of Computer Science, University of Tennessee, Knoxville.
[13] Lopez, J., Roman, R., Agudo, I. and Fernandez-Gago, C. (2010) Trust Management Systems for Wireless Sensor Networks: Best Practices. Computer Communications, 33, 1086-1093.
http://dx.doi.org/10.1016/j.comcom.2010.02.006
[14] Momani, M. (2008) Bayesian Methods for Modeling and Management of Trust in Wireless Sensor Networks. Ph.D. Thesis, University of Technology, Sydney.
[15] Babu, S.S., Raha, A. and Naskar, M.K. (2011) A Direct Trust Dependent Link State Routing Protocol Using Route Trusts for WSNs (DTLSRP). Wireless Sensor Network, 3, 125-134.
http://dx.doi.org/10.4236/wsn.2011.34015
[16] Trakadas, P., Maniatis, S., Zahariadis, T., Leigou, H.C. and Voliotis, S. (2009) A Novel Flexible Trust Management System for Heterogeneous Sensor Networks. International Symposium on Autonomous Decentralized Systems, ISADS 2009, Athens, 23-25 March 2009, 369-374.
[17] Liu, K., Abu-Ghazaleh, N. and Kang, K.D. (2007) Location Verification and Trust Management for Resilient Geographic Routing. Journal of Parallel and Distributed Computing, 67, 215-228.
http://dx.doi.org/10.1016/j.jpdc.2006.08.001
[18] Kim, T.K. and Seo, H.S. (2008) A Trust Model Using Fuzzy Logic in Wireless Sensor Network. Proceedings of World Academy of Science, Engineering and Technology, 44, 69.