[1]
|
PEI Q Q, SHEN Y L, MA J F. Survey of wireless sensor network security techniques[J]. Journal on Communications,2007,28(8):113-122. |
[2]
|
ZENG Zh F, QIU H M, ZHU L H. Risk analysis and security countermeasure about wireless sensor network[J]. Application Research of Computers, 2007,24(1):104-143. |
[3]
|
DENG J, HAN R, MISHRA S. INSENS:intrusion-tolerant routing in wireless sensor network//International Workshop on Smart Appliances and Wearable Computing. In the Proceedings of the 23rd IEEE Conference on Distributed Computing Systems Workshops (ICDCS 2003). Providence, Rhode Island,USA:IEEE Computer Society,2003,5:1-16. |
[4]
|
TANACHAIWIWAT S, DAVE P, BHINDWALE R, et al. Secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks//Proceedings of The First ACM Conference on Embedded Networked Sensor Systems (SenSys 2003).Los Angeles, California, USA: Association for Computing Machinery,2003:1-4. |
[5]
|
ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor network//Proceedings of the 9th ACM Conference on Computer and Communication Security. Washington DC, USA: Association for Computing Machinery,2002:41-47. |
[6]
|
CHEN H, PERRING A, SONG D. Random key predistribution scheme for sensor networks//Proceedings of IEEE Security and Privacy. Berkeley, CA, USA: IEEE Press,2003:197-213. |
[7]
|
DU W, DENG J, HAN Y S, et al. A Pairwise key predistribution scheme for wireless sensor network//Proceedings of the 9th ACM Conference Security. Washington DC, USA: Association for Computing Machinery,2003:1-10. |
[8]
|
LIU D, NING P. Location based pairwise key establishments for static sensor network//The 9th ACM(Association for Computing Machinery) Conference on Computer and Communication Security.Washington DC, USA:Association for Computing Machineng,2003:72-82. |
[9]
|
MENG Q L. Research on key technologies for wireless optical networks. Dalian: Dalian University of Technology,2007:1-5(in Chinese). |
[10]
|
ESTRIN D. Wireless sensor networks tutorial part Ⅳ: sensor network protocols//Proceedings of the 8th ACM Mobicom. Atlanta, Georgia, USA: Association for Computing Machinery,2002: 1-120. |
[11]
|
YU H P, WU Ch X, GUO M. Energy efficiency analysis of mobile sinks wireless sensor network[J]. Computer Engineering,2009,35(13):127-129. |
[12]
|
SOMASUNDARA A A, KANSAL A, JEA D, et al. Controllably mobile infrastructure for low energy embedded networks[J]. IEEE Transactions on Mobile Computing, 2006, 5(8): 958-973. |
[13]
|
REILLY D M, MORIARTY D T, JOHN A. Unique properties of solar blind ultraviolet communication systems for unattended ground sensor networks[J]. Proceedings of SPIE,2004,5611:244-254. |
[14]
|
SHAW G A, SIEGEL A M, MODEL J. Extending the range and performance of non-line-of-sight ultraviolet communication links[J]. Proceedings of SPIE,2006,6231: 244-254. |