[1] |
YAVUZ A A , NING P . Hash-based sequential aggregate and forward secure signature for unattended wireless sensor networks[A]. Mobile and Ubiquitous Systems:Networking & Services[C]. 2009, 1-10.
|
[2] |
RUAN Z , SUN X , LIANG W , et al. CADS:co-operative anti-fraud data storage scheme for unattended wireless sensor networks[J]. Information Technology Journal, 2010,9(7): 1361-1368.
|
[3] |
DI P R , MANCINI L V , SORIENTE C , et al. Catch me (if you can):data survival in unattended sensor networks[A]. Proc IEEE Sixth Ann Int'l Conf Pervasive Computing and Comm[C]. 2008. 185-194.
|
[4] |
DI P R , MA D , SORIENTE C , et al. Posh:proactive co-operative self-healing in unattended wireless sensor networks[A]. Reliable Dis-tributed Systems[C]. 2008. 185-194.
|
[5] |
LIU Z , MA J , PARK Y , et al. Data security in unattended wireless sensor networks with mobile sinks[J]. Wireless Communications and Mobile Computing, 2012,12(13): 1131-1146.
|
[6] |
BOYINBODE O , LE H , MBOGHO A , et al. A survey on clustering algorithms for wireless sensor networks[A]. 2010 13th International Conference on Network-Based Information Systems (NBiS)[C]. 2010. 358-364.
|
[7] |
LI J , MOHAPATRA P . Analytical modeling and mitigation tech-niques for the energy hole problem in sensor networks[J]. Pervasive and Mobile Computing, 2007,3(3): 233-254.
|
[8] |
韩志杰, 黄刘生, 王汝传 等. 一种基于自适应半径调整的无线传感器网络覆盖控制算法[J]. 计算机研究与发展, 2010,47(z2):69-72. HAN Z J , HUANG L S , WANG R C , et al. A coverage control algo-rithm for wireless sensor network based on adaptive adjustment of sensing radius[J]. Journal of Computer Research and Development, 2010,47(z2):69-72.
|
[9] |
HEINZELMAN W R , CHANDRAKASAN A , BALAKRISHNAN H . Energy-efficient communication protocol for wireless microsensor networks[A]. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences,2000[C]. 2000.
|
[10] |
YOUNIS O , FAHMY S . HEED:a hybrid,energy-efficient,distributed clustering approach for ad hoc sensor networks[J]. IEEE Transactions on Mobile Computing, 2004,3(4): 366-379.
|
[11] |
WANG J , YANG X , MA T , et al. An energy-efficient competitive clustering algorithm for wireless sensor networks using mobile sink[J]. IEEE Transactions on Mobile Computing, 2012,5(4): 79-92.
|
[12] |
EL-SAADAWY M , SHAABAN E . Enhancing S-LEACH security for wireless sensor networks[A]. 2012 IEEE International Conference on Electro/Information Technology(EIT), 2012 1-6.
|
[13] |
LI Y , DU L , ZHAO G , et al. A lightweight identity-based authentica-tion protocol[A]. 2013 IEEE International Conference on Signal Proc-essing,Communication and Computing (ICSPCC)[C]. 2013 1-4.
|
[14] |
PENG S . An ID-based multiple authentication scheme against attacks in wireless sensor networks[A]. 2012 IEEE 2nd International Conference on Cloud Computing and Intelligent Systems (CCIS)[C]. 2012 1042-1045.
|
[15] |
XUE K , MA C , HONG P , et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks[J]. Journal of Network and Computer Applications, 2013,36(1): 316-323.
|
[16] |
DELGADO-MOHATAR O , FúSTER-SABATER A , SIERRA J M . A light-weight authentication scheme for wireless sensor networks[J]. Ad Hoc Networks, 2011,9(5): 727-735.
|
[17] |
王良民, 姜顺荣, 郭渊博 . 物联网中移动 Sensor 节点漫游的组合安全认证协议[J]. 中国科学:信息科学, 2012,42(7):815-830. WANG L M , JIANG S R , GUO Y B . Composable-secure authentication protocol for mobile Sensor roaming in the Internet of Things[J]. Scientia Sinica(Informationis), 2012,42(7):815-830.
|
[18] |
SAVOLA R M . Node level security management and authentication in mobile ad hoc networks[A]. Tenth International Conference on Mobile Data Management:Systems,Services and Middleware,MDM '09[C]. 2009. 449-458.
|
[19] |
MA D , SORIENTE C , TSUDIK G . New adversary and new threats:security in unattended sensor networks[J]. Network, IEEE, 2009,23(2): 43-48.
|
[20] |
WANDER A S , GURA N , EBERLE H , et al. Energy analysis of public-key cryptography for wireless sensor networks[A]. Pervasive Computing and Communications,PerCom 2005,Third IEEE Interna-tional Conference on[C]. 2005. 324-328.
|
[21] |
裴庆祺, 沈玉龙, 马建峰 . 无线传感器网络安全技术综述[J]. 通信学报, 2007,28(8):113-122. PEI Q Q , SHEN Y L , MA J F . Survey of wireless sensor network se-curity techniques[J]. Journal on Communications, 2007,28(8):113-122.
|
[22] |
KONG Y , DEND J , TATE S R . A distributed public key caching scheme in large wireless networks[A]. Global Telecommunications Conference (GLOBECOM 2010)[C]. 2010. 1-5.
|