K. Kifayat, M. Staroula-merabti, Q. Shi, P. Kis, and M. Stamp, Security in Wireless Sensor Networks Handbook of Information and Communication Security . PP. 513-552 Berlin ( 2010) 3. ased Security for Wireless Ad Hoc and Sensor 4. ased on Node Trust 6, Model and Simulation of Creditability-based Data Aggre- 2) 9. , Hari, B.: Negotiation-Based Protocols for Disseminating Informa- 10. s 11. ce Hall Inc, New 12. cific Protocol -670 (2002) 14. A Multicriteria Steiner Tree with the Cost of Steiner Vertices

S. Jaydip, A. Boukerch, L. Xu, K. El-khatib, Y. F. Wu et al., A Survey on Wireless Sensor Network Security Trust-b Networks, Secure Routing b Value in Wireless Sensor Networks, pp.55-782413, 2007.

B. Q. Kan, L. Cai, H. S. Zhu, and Y. J. Xu, Accurate Energy Model for WSN Node and Its Optimal Design, D gation for the Internet of Things, pp.427-433, 2008.

D. Chang, K. Cho, N. Choi, T. Kwon, and Y. Choi, A probabilistic and opportunistic flooding algorithm in wireless sensor networks, Probabilistic and Opportunistic Flooding Algorithm in Wireless Sensor Networks, pp.500-506
DOI : 10.1016/j.comcom.2011.11.016

J. H. Tang, S. S. Dai, J. H. Li, K. Joanna, H. Wendi et al., Gossip-based Scalable Directed Diffusion for Wireless Sensor Networks tion in Wireless Sensor Networks Wireless Networks Energy-efficient Data Query Protocol for Wireles Sensor Network, Wireless Communications: Principles and Practice.: An Application Spe Architecture for Wireless Micro Sensor Networks. In: IEEE Trans on Wireless Communications, pp.1418-1430169, 1996.

J. Zhang, L. Xu, D. W. Xu, M. S. Levin, and A. Zamkovoy, Secure Clustering Algorithm based on Trust Evaluation in Ad Hoc Network Computer Application, Journal of Communications Technology and Electronics, vol.10, issue.512, pp.2426-2429, 2007.