[1] Chen Xiangqian, Makki K, Yen K, et al. N. Sensor Network Security: A Survey [J]. IEEE Communications Surveys & Tutorials, 2009, 11(2): 52-73.
[2] Karlof C, Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures[C]//Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications. Alaska: IEEE, 2003: 113-127.
[3] Chen Xiangqian, Makki K, Yen K, et al. Attack Distribution Modeling and Its Applications in Sensor Network Security[J/OL]. [2009-11-15]. http://dl.acm.org/citation.cfm?id=1387787&bnc=1.
[4] Du Xiaojiang, Guizani M, Xiao Yang, et al. A Routing-driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks[J]. IEEE Trans on Wireless Communications, 2009, 8(3): 1223-1229.
[5] Abuhelaleh M A, Mismar T M, Abuzneid A A. Armor-LEACH—Energy Efficient, Secure Wireless Networks Communication[C]//Proceedings of the 17th International Conference on Computer Communications and Networks (ICCCN'08). Virgin Islands: IEEE, 2008: 1-7.
[6] Traynor P, Cao Guohong, La Porta T. The Effects of Probabilistic Key Management on Secure Routing in Sensor Networks[C]//IEEE Wireless Communications and Networking Conference (WCNC 2006). Las Vegas: IEEE, 2006: 659-664.
[7] Jiang Yuanxi, Zhao Baohua. A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks[C]//Proceeding of the 2nd IEEE Asia-Pacific Service Computing Conference. Tsukuba Science City: IEEE, 2007: 49-55.
[8] Liu Fang, Cheng Xiuzhen, Chen Dengchang. Insider Attacker Detection in Wireless Sensor Networks[C]//Proceeding of the 26th Annual IEEE Conference on Computer Communications (INFOCOM'07). Anchorage: IEEE, 2007: 1937-1945.
[9] Lin Xiaodong. CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks[C]//IEEE Global Telecommunications Conference (GLOBECOM 2009). Hawaii: IEEE, 2009: 1-6.
[10] Stetsko A, Folkman L, Matyas V. Neighbor-Based Intrusion Detection for Wireless Sensor Networks[C]//Proceeding of the 6th IEEE International Conference on Wireless and Mobile Communications (ICWMC). Valencia: IEEE, 2010: 420-425.
[11] Wang Yong, Ramamurthy B. Group Rekeying Schemes for Secure Group Communication in Wireless Sensor Networks Communications[C]//Proceedings of the IEEE International Conference on Communications (ICC'07). Glasgow: IEEE, 2007: 3419-3424.
[12] Capkun S, Hubaux J P. Secure Positioning of Wireless Devices with Application to Sensor Networks[C]//Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05). Miami: IEEE, 2005: 1917-1928.
[13] 刘文菊, 刘志宏, 裴庆祺, 等. 传感器网络密钥传播与进化[J]. 西安电子科技大学学报, 2010, 37(3): 547-553.
Liu Wenju, Liu Zhihong, Pei Qingqi, et al. Key Infection and Evolution for Sensor Networks[J]. Journal of Xidian University, 2010, 37(3): 547-553. |