[1]杨黎斌,慕德俊,蔡晓妍.无线传感器网络入侵检测研究[J].计算机应用研究,2008,25(11):3204-3207.
[2]WOOD A D,STANKOVIC J A.Denial of service in sensor networks[J].Computer,2002,35(10):54-62.
[3]ONAT I,MIRI A.An intrusion detection system for wireless sensor networks[C].Procof IEEE International Conferenceon Wireless and Mobile Computing,Networking and Communications(WiMOB 2005),2005.
[4]STRIKOSA.A full approach for intrusion detection in wireless sensor networks [EB/OL].(2007-08-15)[2011-05-12]http://www.it.kth.se/courses/2G1330.
[5]YU Bo,YANG Min,WANG Zhi,et al.Identify abnormal packet loss in selective forwarding attacks[J].Chinese Journal of Computers,2006,29(9):1542-1552.
[6]NGAI C H.Intrusion detection for wireless sensor networks[D].HongKong:The Chinese University of HongKong,2005.
[7]RAJASEGARAR S,LECKIE C,PALANISWAMI M,et al.Distributed anomaly detectionin wireless sensor networks[C].USA:Proc of the 10th IEEE Singapore International Conferenceon Communication System(ICCS 2006),2006.
[8]SU C C,CHANG K M,KUO Y H,et al.The new intrusion prevention and detection approaches for clustering-based sensor networks[C].Maco:Proc of IEEE Wireless Communications and Networking Conference,2005:1927-1932.
[9]LOO C E,NG M Y,LECKIE C,et al.Intrusion detection for routing attacks in sensor networks[J].International Journal of Distributed Sensor Networks,2006,21(4):313-332.
[10]ZENG Peng,LIANG Wei,WANG Jun,et al.Research on security system of wireless sensor networks based on biological immunity principle[J].Minimicro System,2005,26(11):1907-1910.
[11]DOUMIT S,GRAWAL D P.Self-organized criticality and stochastic learning based intrusion detection system for wireless sensor networks[C].France:Proc of IEEE Military Communications Conference(MILCOM 2003),2003.
[12]AGAH A,DAS S K,BASU K,et al.Intrusion detection in sensor networks:a non-coorperative game approach[C].Egept:Proc of the 3rd IEEE International Symposium on Network Computing and Applicaton(NCA 2004),2004.
[13]BHUSE V,GUPTA A.Anomaly intrusion detection in wireless sensor network[J].Journal of High Speed Networks,2006,15(1):33-51.
[14]SILVA A DA,MARTINS M,ROCHA B,et al.Decentralized intrusion detection in wireless sensor networks[C].Proceedings of the 1st ACM International Workshop on Quality of Service & Security in Wireless and Mobile Networks,2005.
[15]LI G,HE J,FU Y.Group-based intrusion detection system in wireless sensor networks[C].Computer Communications,2008,31(18):1511-1515.
[16]MEKA A,SINGH A K.Distributed spatial clustering in sensor networks[C].Heidelberg,Germany:Lecture Notes in Computer Science 3896,Springer Verlag,2006:980-1000. |