1 |
YICK J , MUKHERJEE B , GHOSAL D . Wireless sensor networks survey[J]. Computer Networks, 2008,52(12):2292-2330.
|
2 |
郭江鸿, 马建峰 . 安全透明的无线传感器网络数据汇聚方案[J]. 通信学报, 2012,33(10):51-59. GUO J H , MA J F . Secure and transparent data aggregation for wireless sensor networks[J]. Journal on Communications, 2012,33(10):51-59.
|
3 |
杨军, 张德运, 张云翼 等. 基于分簇的无线传感器网络数据汇聚传送协议[J]. 软件学报, 2010,21(5):1127-1137. YANG J , ZHANG D Y , ZHANG Y Y , et al. Cluster-based data aggregation and transmission protocol for wireless sensor networks[J]. Journal of Software, 2010,21(5):1127-1137.
|
4 |
XUE K P , MA C S , HONG P L , et al. A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks[J]. Journal of Network and Computer Applications, 2013,36(1):316-323.
|
5 |
WANG S S , YAN K Q , WANG S C , et al. An integrated intrusion detection system for cluster-based wireless sensor networks[J]. Expert Systems with Applications, 2011,38(12):15234-15243.
|
6 |
PANTAZIS N A , NIKOLIDAKIS S A , VERGADOS D D . Energy-efficient routing protocols in wireless sensor networks:a survey[J]. IEEE Communications Surveys &Tutorials, 2013,15(2):551-591.
|
7 |
GUERMAZI A , ABID M . An efficient key distribution scheme to secure data-centric routing protocols in hierarchical wireless sensor networks[J]. Procedia Computer Science, 2011,5:208-215.
|
8 |
ZHANG P F , XIAO G X , TAN H P . Clustering algorithms for maximizing the lifetime of wireless sensor networks with energy-harvesting sensors[J]. Computer Networks, 2013,57(14):2689-2704.
|
9 |
KACIMI R , DHAOU R , BEYLOT A L . Load balancing techniques for lifetime maximizing in wireless sensor networks[J]. Ad Hoc Networks, 2013,11(8):2172-2186.
|
10 |
DARABKH K A , ISMAIL S S , Al-SHURMAN M , et al. Performance evaluation of selective and adaptive heads clustering algorithms over wireless sensor networks[J]. Journal of Network and Computer Applications, 2012,35(6):2068-2080.
|
11 |
DUTTA R , BARUA R , SARKAR P . Pairing-Based Cryptographic Protocols:A Survey[R]. Cryptology Eprint Archive,Report 2004,064,2004
|
12 |
BONEH D , FRANKLIN M . Identity based encryption from the weil pairing[J]. SIAM Journal of Computing, 2003,32(3):586-615.
|
13 |
王圣宝 . 基于双线性配对的加密方案及密钥协商协议[D]. 上海: 上海交通大学, 2008. WANG S B . Research on Cryptosystems and Key Agreement Protocols from Bilinear Pairings[D]. Shanghai: Shanghai Jiaotong University, 2008.
|
14 |
CHANG D , CHO K , CHOI N , et al. A probabilistic and opportunistic flooding algorithm in wireless sensor networks[J]. Computer Communications, 2012,35(4):500-506.
|
15 |
GAREY M R , JOHNSON D S . Computers and Intractability:A Guide to the Theory of NP-Completeness[M]. New York:W H Freeman&Co, 1979.
|
16 |
ZHENG C , SUN S X , HUANG T Y . Constructing distributed connected dominating sets in wireless ad hoc and sensor networks[J]. Journal of Software, 2011,22(5):1053-1066.
|
17 |
YIN B , SHI H C , SHANG Y . An efficient algorithm for constructing a connected dominating set in mobile ad hoc networks[J]. Journal of Parallel and Distributed Computing, 2011,71(1):27-39.
|
18 |
ZOU F , WANG Y X , XU X H , et al. New approximations for minimum weighted dominating sets and minimum-weighted connected dominating sets on unit disk graphs[J]. Theoretical Computer Science, 2011,412(3):198-208.
|
19 |
高文宇 . 基于最小生成树的连通支配集求解算法[J]. 计算机应用, 2009,29(6):1490-1493. GAO W Y . Novel connected dominating set algorithm based on minimum spanning tree[J]. Journal of Computer Applications, 2009,29(6):1490-1493.
|
20 |
FRANCILLON A , CASTELLUECIA C . TinyRNG:a cryptographic random number generator for wireless sensors network nodes[A]. Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile,Ad Hoc,and Wireless Networks (WiOpt ’07)[C]. Limassol, 2007.1-17.
|
21 |
杨浩淼, 孙世新, 李洪伟 . 双线性 Diffie-Hellman 问题研究[J]. 四川大学学报 (工程科学版), 2006,38(2):137-140. YANG H M , SUN S X , LI H W . Research on bilinear Diffie-Hellman problem[J]. Journal of Sichuan University (Engineering Science Edition), 2006,38(2):137-140.
|