1 |
Park S D , Kim K . IPv6 over low power WPAN security analysis. draft-daniel-6lowpan-security-analysis-02.txt,IETF draft, February 2008
|
2 |
Michael Healy , Thomas Newe , Elfed Lewis . Security for wireless sensor networks: a review.In: IEEE Sensors Applications Symposium New Orleans, LA,USA, February 2009
|
3 |
冯涛, 马建峰 . 防御无线传感器网络Sybil 攻击的新方法. 通信学报, 2008,29(6):13~19
|
4 |
Douceur J R . The Sybil attack.In: Proceeding of First International Workshop on Peer-to-Peer Systems. London,UK, 2002
|
5 |
俞波, 杨珉 王治 等. 选择传递攻击中的异常丢包检测. 计算机学报, 2006,29(7):1542~1552
|
6 |
陈剑, 曾凡平 . 虫洞攻击检测与防御技术. 计算机工程, 200834(7):139~141
|
7 |
Karlof C , Wagner D . Secure routing in wireless sensor networks:attacks and countermeasures. IEEE International Workshop on Sensor Network Protocols and Applications, 2003,1(5):113~127
|
8 |
朱政坚, 谭庆平, 朱培栋 . 无线传感器网络安全研究综述. 计算机工程与科学, 2008,130(14):101~105
|
9 |
Mustafa Hasan , Ali Hammad Akbar Rabia Riaz . Key management in IP-based ubiquitous sensor networks: issues, challenges and solutions, , 2008
|
10 |
Wooyoung Jung , Sungmin Hong Minkeun Ha . SSL-based lightweight security of IP-based wireless sensor networks.In: 2009 International Conference on Advanced Information Networking and Applications Workshops, 2009
|
11 |
Kushalnagar N . 6LoWPAN: overview,assumptions,problem statement and goals. . RFC4919
|
12 |
HyunGon Kim . Protection against packet fragmentation attacks at 6LoWPAN adaptation layer.In: International Conference on Convergence and Hybrid Information Technology, 2008
|
13 |
Know your enemy: honeynets, , 2005-5-12
|
14 |
肖军弼, 刘广祎 . 分布式蜜罐系统的设计与实现. 计算机工程与设计, 2007,28(19):4628~4630
|
15 |
谢逸, 余顺争 . 基于Web用户浏览行为的统计异常检测. 软件学报, 2007,18(4):967~977
|
16 |
Yu S Z , Kobayashi H . An efficient forward-backward algorithm for an explicit duration hidden Markov model. IEEE Signal Processing Letters, 2003,10(1):11~14
|
17 |
TinyOS Community Forum,
|
18 |
刘外喜, 胡晓 . 基于Zigbee的无线温度传感网络的设计. 传感器与微系统, 2009,4(28):69~71
|