M. Aruldoss, T. M. Lakshmi, and V. P. Venkatesan, “A survey on multi-criteriadecision-making methods and its applications,” American Journal of Information Systems, vol. 1, no. 1, pp. 31–43, 2013.
K. Steele, Y. Carmel, J. Cross, and C. Wilcox, “Uses and misuses of multicriteria decision analysis (mcda) in environmental decision making,” Risk analysis, vol. 29, no. 1, pp. 26–33, 2009.10.1111/j.1539-6924.2008.01130.x
J.-H. Cho, A. Swami, and R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 562–583, 2011.10.1109/SURV.2011.092110.00088
K. Govindan and P. Mohapatra, “Trust computations and trust dynamics in mobile adhoc networks: a survey,” IEEE Communications Surveys & Tutorials, vol. 14, no. 2, pp. 279– 298, 2012.10.1109/SURV.2011.042711.00083
Y. Ren and A. Boukerche, “Modeling and managing the trust for wireless and mobile ad hoc networks,” in ICC’08.IEEE International Conference on Communications, 2008., pp. 2129–2133, IEEE, 2008.
R. Falcone, G. Pezzulo, and C. Castelfranchi, “A fuzzy approach to a belief-based trust computation,” in Trust, reputation, and security: theories and practice, pp. 73–86, Springer, 2003.10.1007/3-540-36609-1_7
Z. Xu, “Uncertain linguistic aggregation operators based approach to multiple attribute group decision making under uncertain linguistic environment,” Information Sciences, vol. 168, no. 1, pp. 171–184, 2004.10.1016/j.ins.2004.02.003
J.-L. Marichal and M. Roubens, “Determination of weights of interacting criteria from a reference set,” European journal of operational Research, vol. 124, no. 3, pp. 641-650, 2000.10.1016/S0377-2217(99)00182-4
T. L. Saaty, “Decision making with the analytic hierarchy process,” International journal of services sciences, vol. 1, no. 1, pp. 83–98, 2008.10.1504/IJSSCI.2008.017590
J. K. Wong and H. Li, “Application of the analytic hierarchy process (ahp) in multicriteria analysis of the selection of intelligent building systems,” Building and Environment, vol. 43, no. 1, pp. 108–125, 2008.10.1016/j.buildenv.2006.11.019
Z. Liu, A. W. Joy, and R. A. Thompson, “A dynamic trust model for mobile ad hoc networks,” in Distributed Computing Systems, 2004. FTDCS 2004.Proceedings.10th IEEE International Workshop on Future Trends of, pp. 80–85, IEEE, 2004.
A. A. Pirzada and C. McDonald, “Trusted greedy perimeter stateless routing,” in 15th IEEE International Conference on Networks, 2007. ICON 2007., pp. 206–211, IEEE, 2007.10.1109/ICON.2007.4444087
N. Abu-Ghazaleh, K.-D. Kang, and K. Liu, “Towards resilient geographic routing in wsns,” in Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks, pp. 71 –78, ACM, 2005.10.1145/1089761.1089774
M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya, “Quantifying trust in mobile ad-hoc networks,” in Proc. IEEE Intl Conf. Integration of Knowledge Intensive Multi-Agent Systems (KIMAS), 2005.
S. Buchegger and J.-Y.LeBoudec, “Performance analysis of the confidant protocol,” in Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, pp. 226–236, ACM, 2002.10.1145/513800.513828
X. Li, Z. Jia, P. Zhang, R. Zhang, and H. Wang, “Trust -based on-demand multipath routing in mobile ad hoc networks,” IET information security, vol. 4, no. 4, pp. 212–232, 2010.10.1049/iet-ifs.2009.0140
N. Marchang and R. Datta, “Light-weight trust-based routing protocol for mobile ad hoc networks,” Information Security, IET, vol. 6, no. 2, pp. 77–83, 2012.10.1049/iet-ifs.2010.0160
A. A. Pirzada, C. McDonald, and A. Datta, “Performance comparison of trust-based reactive routing protocols,” IEEE Transactions on Mobile Computing, vol. 5, no. 6, pp. 695–710, 2006.10.1109/TMC.2006.83
H. N. Ho, M. Rabah, S. Nowakowski, and P. Estraillier, “Trace-based weighting approach for multiple criteria decision making,” Journal of Software (JSW), vol. 9, no. 8, pp. 2180–2187, 2014.
W. Jiang, G. Wang, and J. Wu, “Generating trusted graphs for trust evaluation in online social networks,” Future generation computer systems, vol. 31, pp. 48–58, 2014.10.1016/j.future.2012.06.010
L. Capra, “Engineering human trust in mobile system collaborations,” ACM SIGSOFT Software Engineering Notes, vol. 29, no. 6, pp. 107–116, 2004.10.1145/1041685.1029912
B. Karp and H.-T. Kung, “Gpsr: Greedy perimeter stateless routing for wireless networks,” in Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 243–254, ACM, 2000.10.1145/345910.345953
P. R. Vamsi and K. Kant, “Adaptive trust model for secure geographic routing in wireless sensor networks,” in Contemporary Computing (IC3), 2014 Seventh International Conference on, pp. 394–399, IEEE, 2014.10.1109/IC3.2014.6897206
M. R. Juliana and S. Srinivasan, “Seladg: Secure energy efficient location aware data gathering approach for wireless sensor networks,” International Journal on Smart Sensing & Intelligent Systems, vol. 8, no. 3, 2015.10.21307/ijssis-2017-828
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “Wireless sensor networks: a survey,” Computer networks, vol. 38, no. 4, pp. 393-422, 2002.10.1016/S1389-1286(01)00302-4
S. D. T. Kelly, N. K. Suryadevara, and S. C. Mukhopadhyay, “Towards the implementation of iot for environmental conditionmonitoring in homes,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3846-3853, 2013.
Suryadevara, N. K., Mukhopadhyay, S. C., Kelly, S. D. T., & Gill, S. P. S, “WSN-based smart sensors and actuator for power management in intelligent buildings.” IEEE/ASME Transactions On Mechatronics, vol. 20, no.2, 2015, pp 564-571.10.1109/TMECH.2014.2301716
D. Bhattacharjee and R. Bera, “Development of smart detachable wireless sensing system for environmental monitoring,” International Journal on Smart Sensing and Intelligent Systems, vol. 7, no. 3, pp. 1239-1253, 2014.
P. R. Vamsi and K. Kant, “Systematic design of trust management systems for wireless sensor networks: A review,” in Fourth International Conference on Advanced Computing & Communication Technologies (ACCT), Rohtak, India, pp. 208-215, IEEE, 2014.10.1109/ACCT.2014.28
A. Ahmed, K. A. Bakar, M. I. Channa, K. Haseeb, and A. W. Khan, “A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks,” Frontiers of Computer Science, vol. 9, no. 2, pp. 280-296, 2015.10.1007/s11704-014-4212-5