[1] |
余翔, 刘磊, 吴堃 . 基于环形搜索的WSN簇间最优路由选择[J]. 电信科学, 2015,31(2): 103-107. XU X , LIU L , WU K . Optimal routing between clusters based on circular search method in WSN[J]. Telecommunications Science, 2015,31(2): 103-107.
|
[2] |
李建中, 高宏 . 无线传感器网络的研究进展[J]. 计算机研究与发展, 2008,45(1): 1-15. LI J Z , GAO H . Survey on sensor network research[J]. Journal of Computer Research and Development, 2008,45(1): 1-15.
|
[3] |
SANG S J , VALERO M , BOURGEOIS A ,et al. Attacking and securing beacon-enabled 802.15.4 networks[J]. Wireless Networks, 2014,21(1): 1-19.
|
[4] |
胡蓉华, 董晓梅, 王大玲 . 无线传感器网络节点复制攻击和女巫攻击防御机制研究[J]. 电子学报, 2015,43(4): 743-752. HU R H , DONG X M , WANG D L . Defense mechanism against node replication attacks and sybil attacks in wireless sensor networks[J]. Acta Electronica Sinica, 2015,43(4): 743-752.
|
[5] |
GUI J J , TAO Z , ZHANG Y S . Modeling and analyzing the sybil attack to ad hoc routing protocols[C]// 2010 International Conference on Multimedia Technology(ICMT),Oct 29-31,2010, Ningbo,China. New Jersey: IEEE Press, 2010: 1-5.
|
[6] |
XING K , RIVERA M J , LI J ,et al. Attacks and countermeasures in sensor networks:a survey[M]. Berlin: SpringerPress, 2010: 251-272.
|
[7] |
张婷, 何泾沙 . 基于抗局部攻击的无线传感器网络定位方法[J]. 北京交通大学学报, 2012,36(3): 80-83. ZHANG T , HE J S . An attack-resistant localization method in wireless sensor networks[J]. Journal of Beijing Jiaotong University, 2012,36(3): 80-83.
|
[8] |
罗文俊, 高一峰 . 基于位置的身份验证[J]. 吉林大学学报(工学版), 2012,35(S1): 300-303. LUO W J , GAO Y F . Location based authentication[J]. Journal of Jilin University(Engineering and Technology Edition), 2012,35(S1): 300-303.
|
[9] |
LI X L , WU M L . A shadowing-model-based scheme for sybil attack detection in wireless sensor networks[J]. Journal of Convergence Information Technology, 2013,38(8): 609-616.
|
[10] |
张俊伟, 马卓, 马建峰 ,等. 基于位置密钥交换的UC 安全模型[J]. 计算机研究与发展, 2014,51(2): 353-359. ZHANG J W , MA Z , MA J F ,et al. UC security model of position-based key exchange[J]. Journal of Computer Research and Development, 2014,51(2): 353-359.
|
[11] |
章丽娟, 王清贤 . 基于多视图的攻击分类体系[J]. 计算机应用研究, 2010,27(1): 255-258. ZHANG L J , WANG Q X . Network attack classification architecture based on multi-view[J]. Application Research of Computer, 2010,27(1): 255-258.
|
[12] |
LU A , WANG W , DNYTE A ,et al. Sybil attack detection through global topology pattern visualization[J]. Information Visualization, 2011,10(1): 32-46.
|
[13] |
东尚清 . 可调带宽低功耗超带宽Gm-C 低通滤波器的研究与设计[D]. 上海:复旦大学, 2013. DONG S Q . Research and design for ultra wideband Gm-C low pass filter of tunable bandwidth low power consumption[D]. Shanghai:Fudan University, 2013.
|
[14] |
NEWSOME J , SHI E , SONG D ,et al. The sybil attack in sensor networks:analysis & defenses[C]// Third International Symposium on Information Processing in Sensor Networks,April 26-27,2004, Berkeley,CA,USA. New Jersey: IEEE Press, 2004: 259-268.
|
[15] |
SAHINOGLU Z , GEZICI S . Ranging in the IEEE 802.15.4a standard[C]// 2006 IEEE Wireless and Microwave Technology Conference,Dec 4-5,2006, Clearwater Beach,FL,USA. New Jersey: IEEE Press, 2006: 1-5.
|