共 56 条
[41]
Dutertre B., Cheung S., Levy J., Lightweight key management in wireless sensor networks by leveraging initial trust, SRI International, SDL Technical Report SRI-SDL-04-02, (2004)
[42]
Sencun Z., Sanjeev S., Sushi J., LEAP: Efficient security mechanisms for large-scale distributed sensor networks, Proc. ACM Conf. Comput. Commun. Security, pp. 62-72, (2003)
[43]
Karlof C., Wagner D., Secure routing in wireless sensor networks: Attacks and countermeasures, Elsevier's AdHoc Netw. J., 1, pp. 293-315, (2003)
[44]
Spencer J., The Strange logic of Random Graph, (2001)
[45]
Karp B., Kung H., GPSR: Greedy perimeter stateless routing for wireless networks, Proc. ACM International Conf. Mobile Comput. Netw., (2000)
[46]
Intanagonviwat C., Govindan R., Estrin D., Directed diffusion: A scalable and robust communication paradigm for sensor networks, Proc. ACM International Conf. Mobile Comput. Netw., (2000)
[47]
Heinzelman W., Chandrakasan A., Balakrishnan H., Energyefficient communication protocols for wireless microsensor networks (leach), Proc. 33rd Hawaii International Conf. Syst. Science, (2000)
[48]
Tanachaiwiwat S., Dave P., Bhindwale R., Helmy A., Secure locations: Routing on trust and isolating compromised sensors in locationaware sensor networks, Proc. 1st. ACM Conf. Embedded Netw. Sensor Syst., (2003)
[49]
Wood A.D., Fang L., Stankovic J.A., He T., SIGF: A family of configurable, secure routing protocols for wireless sensor networks, Proc. 4th ACM Workshop Security Ad Hoc Sensor Netw., (2006)
[50]
Schugers C., Srivastava M., Energy efficient routing in wireless sensor networks, Proc. Milcom, (2001)