[1] Jens-Matthias B, Alban H, Osman U. A Secure and Resilient WSN Roadside Architecture for Intelligent Transport Systems[C]//Proceedings of the First ACM Conference on Wireless Network Security. New York: ACM, 2008: 161-171.
[2] 霍宏伟, 张宏科, 张思东. 一种面向铁路轨道监测的无线传感器网络模型研究[J]. 西安电子科技大学学报, 2007, 34(1): 35-38.
Huo Hongwei, Zhang Hongke, Zhang Sidong. Research on a Wireless Sensor Network Used in Railway Track Inspection[J]. Journal of Xidian University, 2007, 34(1): 35-38.
[3] Zhang Y C, Liu W, Lou W J, et al. Location-based Compromise Tolerant Security Mechanisms in Wireless Sensor Networks[J]. Areas Communication Special Issue Security Wireless Ad Hoc Networks, 2006, 24(2): 247-260.
[4] Dong Q, Liu D G, Ning P. Pre-authentication Filters: Providing Dos Resistance for Signature-based Broadcast Authentication in Sensor Networks[C]//Proceedings of the First ACM Conference on Wireless Network Security. New York: ACM, 2008: 2-12.
[5] Ren K, Zeng K, Lou W J, et al. On Broadcast Authentication in Wireless Sensor Networks[J]. IEEE Transactions on Wireless Communications, 2007, 6(11): 4136-4144.
[6] Ayday E, Delgosha F, Fekri F. Efficient Broadcast Authentication for Wireless Sensor Networks[C]//Networking Technologies for Software Define Radio Networks, 2007 2nd IEEE Workshop. San Diego: IEEE Computer Society, 2007: 61-62.
[7] Chang S M, Shieh S, Lin W W, et al. An Efficient Broadcast Authentication Scheme in Wireless Sensor Networks[C]//Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security ASIACCS'06. San Diego: IEEE Computer Society, 2006: 311-320.
[8] Perrig A, Szewczyk R, Wen V, et al. SPINS: Security Protocols for Sensor Networks[J]. Wireless Networks Journal, 2002, 8(5): 521-534.
[9] Liu D G, Ning P. Multi-level μTESLA: Broadcast Authentication for Distributed Sensor Networks [J]. ACM Trans in Embedded Computing Systems (TECS), 2004, 3(4): 800-836.
[10] Liu D G, Ning P. Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks[C]//Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS'03). New York: ACM, 2003: 263-276.
[11] Liu D G, Ning P, Zhu S C. Practical Broadcast Authentication in Sensor Networks[C]//Proceedings of The 2nd Annual International Conference on Mobile and Ubiquitous Systems Networking and Services. Piscataway: IEEE, 2005:118-129.
[12] Drissi J, Gu Q J. Localized Broadcast Authentication in Large Sensor Networks[C]//Proceedings of the International Conference on Networking and Services. Washington: IEEE Computer Society, 2006: 25.
[13] 沈玉龙, 裴庆琪, 马剑锋. MMμTESLA:多基站传感器网络广播认证协议[J]. 计算机学报, 2007, 30(4): 539-546.
Shen Yulong, Pei Qingqi, Ma Jianfeng. MMμTESLA: Broadcast Authentication Protocol for Multi-Base-Station Sensor Networks[J]. Chinese Journal of Computers, 2007, 30(4): 539-546.
[14] Saurabh G, Christina P, Mani B S, et al. Secure Time Synchronization in Sensor Networks[J]. Trans on Information and System Security, 2008, 11(4): 23.
[15]孙纪敏, 沈玉龙, 裴庆琪, 等. 传感器网络异常时间同步数据过滤算法[J]. 西安电子科技大学学报, 2008, 35(5): 910-915.
Sun Jimin, Shen Yulong, Pei Qingqi, et al. Abnormal Time Synchronization Data Filter Algorithm in Sensor Networks[J]. Journal of Xidian University, 2008, 35(5): 910-915.
[16] Atakli I M, Hu H B, Chen Y, et al. Malicious Node Detection in Wireless Sensor Networks Using Weighted Trust Evaluation[C]//SpringSim'08: Proceedings of the 2008 Spring Simulation Multiconference. San Diego: Society for Computer Simulation International, 2008: 836-843.
[17] Karlof C, Sastry N, Li Y, et al. Distillation Codes and Applications to Dos Resistant Multicast Authentication[C]//11th Network and Distributed Systems Security Symposium (NDSS). San Diego: IEEE Computer Society, 2004.
[18] Ning P, Liu A, Du W L. Mitigating DoS Attacks Against Broadcast Authentication in Wireless Sensor Networks[J]. ACM Trans on Sensor Networks, 2008, 4(1): 1-31. |