[1] |
AKYILDIZ F , SC W , SANKARASUBRAMANIAM Y , et al. A survey on sensor networks[J]. IEEE Communications Magazine, 2002, 40(8): 102-114.
|
[2] |
袁艳祥, 游林 . 基于身份加密的可认证密钥协商协议[J]. 信息网络安全, 2014(3): 1-6.
|
|
YUAN Y X , YOU L . Identity-based encryption authenticated key agreement protocol[J]. Netinfo Security, 2014(3): 1-6.
|
[3] |
赵强利, 蒋艳凰, 徐明 . 无线传感器网络路由协议的分析与比较[J]. 计算机科学, 2009, 36(2): 35-41.
|
|
ZHAO Q L , JIANG Y H , XU M . Analysis and comparison of rout-ing protocols for wireless sensor networks[J]. Computer Science, 2009, 36(2): 35-41
|
[4] |
[EB/OL]. .
|
[5] |
汪祥莉, 李腊元, 王文波 . 无线传感器网络中的路由协议研究[J]. 计算机科学, 2008, 38(7): 50-52,60.
|
|
WANG X L , LI L Y , WANG W B . Research on routing protocols for wireless sensor networks[J]. Computer Science, 2008, 35(7): 50-52,60.
|
[6] |
吴征, 朱军 , 等. 一种新的基于LEACH的WSN分簇协议[J]. 计算机技术与发展, 2010, 20(5): 29-33.
|
|
WU Z , ZHU J , et al. A new LEACH-based clustering protocol for wireless sensor networks[J]. Computer Technology and Develop-ment, 2010, 20(5): 29-33.
|