[1] |
王良民, 李菲, 熊书明 ,等. 无线传感器网络内部攻击检测方法研究[J]. 计算机科学, 2011,38(4): 97-129. WANG L M , LI F , XIONG S M ,et al. Research on detection methods for insidious attack of wireless sensor networks[J]. Computer Science, 2011,38(4): 97-129.
|
[2] |
ESCHENAUER L , GLIGOR V D . A key-management scheme for distributed sensor networks[A]. Proceedings of the ACM Conference on Computer and Communication Security (CCS)[C]. Washington,USA, 2002. 41-47.
|
[3] |
CHAN H , PERRIG A , SONG D . Random key predistribution schemes for sensor networks[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Berkeley,USA, 2003. 197-213.
|
[4] |
DOUCEUR J.R . The sybil attack[A]. Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’01)[C]. London,UK, 2002. 251-260.
|
[5] |
NEWSOME J , SHI E , SONG D ,et al. The sybil attack in sensor networks:analysis & defenses[A]. Proceedings of ACM IPSN’04[C]. Berkeley,USA, 2004. 259-268.
|
[6] |
PARNO B , PERRIG A , GLIGOR V D . Distributed detection of node replication attacks in sensor networks[A]. Proceedings of 2005 IEEE Symposium on Security and Privacy (S&P ’05)[C]. Oakland,USA, 2005. 49-63.
|
[7] |
CONTI M , PIETRO R , MANCINI L . A randomized,efficient,and distributed protocol for the detection of node replication attacks in wireless sensor networks[A]. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc’07)[C]. Quebec,Canada, 2007. 80-89.
|
[8] |
HO J W , LIU D G , WRIGHT M ,et al. Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks[J]. Ad Hoc Networks, 2009(7): 1476-1488.
|
[9] |
HO J W , WRIGHT M , DAS S K . Fast detection of replica node attacks in mobile sensor networks using sequential analysis[A]. IEEE INFOCOM 2009[C]. Rio de Janeiro,Brazil, 2009. 1773-1781.
|
[10] |
WANG L M , SHI Y . Patrol detection for replica attacks on wireless sensor networks[J]. Sensors, 2011,11(3): 2496-2504.
|