[1] 于海斌, 曾鹏. 智能无线传感器网络系统 [M]. 北京: 科学出版社, 2006.
[2] Perrig A, Stankovic J, Wagner D, Security in Wireless Sensor Networks [J]. Communications of the ACM, 2004, 47(6): 53-57.
[3] 孔繁瑞, 李春文. 无线传感器网络动态密钥管理方法 [J]. 软件学报, 2010, 21(7): 1679-1691.
Kong Fanrui, LI Chunwen. Dynamic Key Management Scheme for Wireless Sensor Network [J]. Journal of Software, 2010, 21(7): 1679-1691.
[4] 苏忠, 林闯, 封富君, 等. 无线传感器网络密钥管理的方案和协议 [J]. 软件学报, 2008, 18(5): 1218-1231.
Su Zhong, Lin Chuang, Feng Fujun, et al. Key Management Schemes and Protocols for Wireless Sensor Networks [J]. Journal of Software, 2008, 18(5): 1218-1231.
[5] Tague P, Poovendran R. Modeling Adaptive Node Capture Attacks in Multi-hop Wireless Networks [J]. Ad Hoc Network, 2007, 5(6): 801-814.
[6] Tague P, Poovendran R. Modeling Node Capture Attacks in Wireless Sensor Networks[C]//Proc of the 46th Annual Allerton Conference on Communication, Control, and Computing. Urbana: IEEE, 2008: 1221-1224.
[7] Bonaci T, Bushnell L, Poovendran R. Node Capture Attacks in Wireless Sensor Networks: a System Theoretic Approach [C]//Proc of the 49th IEEE Conference on Decision and Control. Atlanta: IEEE, 2010: 6765-6772.
[8] Eschenauer L, Gligor V. A Key Management Scheme for Distributed Sensor Networks[C]//Proc of the 9th ACM Conf. on Computerand Communications Security. New York: ACM, 2002: 41-47.
[9] 尤昌德. 现代控制理论基础 [M]. 北京: 电子工业出版社, 1996.
[10] Brown J, Du Xiaojiang. Detection of Selective Forwarding Attacks in Heterogeneous Sensor Networks[C]//Proc of the 2008 IEEE International Conference on Communications. Beijing: IEEE, 2008: 1583-1587. |