**7. References**


International Conference on Mobile Computing and Networking (MobiCom'99), Seattle, WA, August 1999.

[29] C. Intanagonwiwat, R. Govindan and D. Estrin, "Directed diffusion: A scalable and robust communication paradigm for sensor networks", Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'00), Boston, MA, August 2000.

282 Wireless Sensor Networks – Technology and Protocols

4, Fourth Quarter 2005 Page(s):2 – 28.

[16] http://www.fao.org/sd/EIdirect/EIre0074.htm

278.

2005.

Maryland.

ACM 43 (2000) 38–41.

networks", Wiley, c2006.

ACM 43 (5) (2000) 551–558.

survey", Computer Networks 38 (2002) 393–422

millimeter computer",IEEE Computer (January2001) 2–9.

Proceedings of ACM MobiCom'00, August 2000, pp. 32–43.

Computing and Networks MOBICOM 2001.

IEEE International Workshops on 10-12 June 2002 Page(s):139 – 144.

[11] Djenouri, D.; Khelladi, L.; Badache, A.N. "A survey of security issues in mobile ad hoc and sensor networks", Communications Surveys & Tutorials, IEEE.Volume 7, Issue

[12] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci,"Wireless sensor networks: a

[13] A. Cerpa, J. Elson, M. Hamilton, J. Zhao, "Habitat monitoring: application driver for wireless communications technology", ACM SIGCOMM'2000, Costa Rica, April 2001. [14] C. Jaikaeo, C. Srisathapornphat, C. Shen, "Diagnosis of sensor networks", IEEE International Conference on Communications ICC'01, Helsinki, Finland, June 2001. [15] B. Warneke, B. Liebowitz, K.S.J.Pister, "Smart dust: communicating with a cubic

[17] J.M. Kahn, R.H. Katz, K.S.J. Pister, "Next century challenges: mobile networking for smart dust", Proceedings of the ACM MobiCom'99, Washington, USA, 1999, pp. 271–

[18] N. Noury, T. Herve, V. Rialle, G. Virone, E. Mercier, G. Morey, A. Moro, T. Porcheron, "Monitoring behavior in home using a smart fall sensor", IEEE-EMBS Special Topic Conference on Microtechnologies in Medicine and Biology, October 2000, pp. 607–610. [19] D. Estrin, R. Govindan, J. Heidemann, "Embedding the Internet", Communication

[20] N. Priyantha, A. Chakraborty, H. Balakrishnan, "The cricket location-support system",

[21] Karl, Holger, Willig, Andreas, "Protocols and architectures for wireless sensor

[22] Slijepcevic, S.; Potkonjak, M.; Tsiatsis, V.; Zimbeck, S.; Srivastava, M.B."On communication security in wireless ad-hoc sensor networks. Enabling Technologies: Infrastructure for Collaborative Enterprises", WET ICE 2002, Proceedings. Eleventh

[23] Krishnamachari, Bhaskar, "networking wireless sensors", Cambridge University Press,

[24] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and D. Tygar, " SPINS: Security Protocols for Sensor Networks", Proceedings of Seventh Annual International Conference on Mobile

[25] G.J. Pottie, W.J. Kaiser, "Wireless integrated network sensors", Communications of the

[26] J.M. Rabaey, M.J. Ammer, J.L. da Silva Jr., D. Patel, S. Roundy, "PicoRadio supports ad hoc ultra-low power wireless networking", IEEE Computer Magazine (2000) 42–48. [27] Kemal Akkaya, Mohamed Younis, "A Survey on Routing Protocols for Wireless Sensor Networks", Department of Computer Science and Electrical Engineering. University of

[28] W. Heinzelman, J. Kulik, and H. Balakrishnan, "Adaptive protocols for information dissemination in wireless sensor networks", Proceedings of the 5th Annual ACM/IEEE

	- [44] Jing, Q.; Tang, L.Y.; Chen, Z. Trust Management in Wireless Sensor Networks. *J. Softw.*  **2008**, *19*, 1716-1730.
	- [45] Hur J, Lee Y, Yoon H, Choi D, Jin S. Trust evaluation model for wireless sensor networks. *Advanced Communication Technology Conference*, Phoenix Park, Korea, 2005; 491–496.
	- [46] G. Theodorakopoulos and J. S. Baras, "On trust models and trust evaluation metrics for ad hoc networks," *IEEE J. on Selected Areas in Comm.*, vol. 24, no. 2, pp. 318–328, Feb. 2006.
	- [47] Marmol, F.G.; Perez, G.M. Towards Pre-standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems. *Comput. Stand. Interfaces* **2010**, *32*, 185-196.
	- [48] G. Shafer, "A mathematical theory of evidence,", Princeton University, 1976.
	- [49] M. Momani, S. Challa, and K. Aboura, "Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective," presented at International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CIS2E 06) University of Bridgeport, USA, 2006.
	- [50] M. Momani, K. Aboura and S. Challa, "RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks", in *The Third International Conference on Intelligent Sensors, Sensor Networks and Information*, Melbourne, Australia, 2007.
	- [51] P. A. Morris, "Bayesian expert resolution," in *Department of Engineering-Economic Systems*, vol.Ph.D: Stanford University, 1971.
	- [52] D. V. Lindley and N. D. Singpurwalla, "Reliability (and fault tree) analysis using expert opinions. ," *Journal of the American Statistical Association*, vol. 81, pp. 87-90, 1986.
	- [53] Feng, Renjian; Xu, Xiaofeng; Zhou, Xiang; Wan, Jiangwen. 2011. "A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory." *Sensors* 11, no. 2: 1345-1360, 2011
	- [54] Dempster, A. Upper and Lower Probabilities Induced by Multivalued Mapping. *Ann. Math. Stat.* **1967**, *38*, 325-339.
	- [55] Lopez, J.; Roman, R.; Agudo, I.; Fernandez, C.G. Trust Management Systems for Wireless Sensor Networks: Best Practices. *Comput. Commun.* **2010**, *33*, 1086-1093.
	- [56] Li, J.L.; Gu, L.Z.; Yang, Y.X. A New Trust Management Model for P2P Networks with Time Self-Decay and Subjective Expect. *J. Electron. Inf. Technol.* **2009**, *31*, 2786-2790.
	- [57] Li, L.; Fan, L.; Hui, H. Behavior-Driven Role-Based Trust Management. *J. Softw.* **2009**, *20*, 2298-2306
	- [58] Lewis N, Foukia N., Using trust for key distribution and route selection in wireless sensor networks. *IEEE Globecom*, Washington DC, USA, 2007.
	- [59] Atakli IM, Hu H, Chen Y, Ku WS, Su Z. Malicious node detection in wireless sensor networks using weighted trust evaluation. *Spring Simulation Multiconference*, Ottawa, Canada, 2008.
	- [60] http://en.wikipedia.org/wiki/Reputation\_systems
	- [61] L. Mui, A. Halberstadt, and M. Mohtashemi, "Notions of Reputation in Multi-Agents Systems: A Review", *Proc. First Int'l Joint Conf. Autonomous Agents and Multi-Agent Systems,* pp. 280-287, July 2002.

[62] http://www.ebay.com

284 Wireless Sensor Networks – Technology and Protocols

**2008**, *19*, 1716-1730.

of Bridgeport, USA, 2006.

*Systems*, vol.Ph.D: Stanford University, 1971.

Theory." *Sensors* 11, no. 2: 1345-1360, 2011

[60] http://en.wikipedia.org/wiki/Reputation\_systems

*Systems,* pp. 280-287, July 2002.

*Math. Stat.* **1967**, *38*, 325-339.

*20*, 2298-2306

Canada, 2008.

491–496.

2006.

185-196.

[44] Jing, Q.; Tang, L.Y.; Chen, Z. Trust Management in Wireless Sensor Networks. *J. Softw.* 

[45] Hur J, Lee Y, Yoon H, Choi D, Jin S. Trust evaluation model for wireless sensor networks. *Advanced Communication Technology Conference*, Phoenix Park, Korea, 2005;

[46] G. Theodorakopoulos and J. S. Baras, "On trust models and trust evaluation metrics for ad hoc networks," *IEEE J. on Selected Areas in Comm.*, vol. 24, no. 2, pp. 318–328, Feb.

[47] Marmol, F.G.; Perez, G.M. Towards Pre-standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems. *Comput. Stand. Interfaces* **2010**, *32*,

[49] M. Momani, S. Challa, and K. Aboura, "Modelling Trust in Wireless Sensor Networks from the Sensor Reliability Prospective," presented at International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CIS2E 06) University

[50] M. Momani, K. Aboura and S. Challa, "RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks", in *The Third International Conference* 

[52] D. V. Lindley and N. D. Singpurwalla, "Reliability (and fault tree) analysis using expert opinions. ," *Journal of the American Statistical Association*, vol. 81, pp. 87-90, 1986. [53] Feng, Renjian; Xu, Xiaofeng; Zhou, Xiang; Wan, Jiangwen. 2011. "A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence

[54] Dempster, A. Upper and Lower Probabilities Induced by Multivalued Mapping. *Ann.* 

[55] Lopez, J.; Roman, R.; Agudo, I.; Fernandez, C.G. Trust Management Systems for Wireless Sensor Networks: Best Practices. *Comput. Commun.* **2010**, *33*, 1086-1093. [56] Li, J.L.; Gu, L.Z.; Yang, Y.X. A New Trust Management Model for P2P Networks with Time Self-Decay and Subjective Expect. *J. Electron. Inf. Technol.* **2009**, *31*, 2786-2790. [57] Li, L.; Fan, L.; Hui, H. Behavior-Driven Role-Based Trust Management. *J. Softw.* **2009**,

[58] Lewis N, Foukia N., Using trust for key distribution and route selection in wireless

[59] Atakli IM, Hu H, Chen Y, Ku WS, Su Z. Malicious node detection in wireless sensor networks using weighted trust evaluation. *Spring Simulation Multiconference*, Ottawa,

[61] L. Mui, A. Halberstadt, and M. Mohtashemi, "Notions of Reputation in Multi-Agents Systems: A Review", *Proc. First Int'l Joint Conf. Autonomous Agents and Multi-Agent* 

sensor networks. *IEEE Globecom*, Washington DC, USA, 2007.

*on Intelligent Sensors, Sensor Networks and Information*, Melbourne, Australia, 2007. [51] P. A. Morris, "Bayesian expert resolution," in *Department of Engineering-Economic* 

[48] G. Shafer, "A mathematical theory of evidence,", Princeton University, 1976.

