共 21 条
[1]
[Anonymous], 2005, P ACM MOBIHOC, DOI DOI 10.1145/1062689.1062697
[2]
[Anonymous], 2003, P SENSYS, DOI DOI 10.1145/958491.958494
[3]
Crosby GV, 2006, DSSNS 2006: SECOND IEEE WORKSHOP ON DEPENDABILITY AND SECURITY IN SENSOR NETWORKS AND SYSTEMS, P13
[4]
Dam T. V., 2003, P 1 INT C EMB NETW S, P171, DOI DOI 10.1145/958491.958512
[5]
Deng J, 2004, 2004 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, P637
[6]
Deng J., 2005, SASN '05: Proceedings of the 3rd ACM workshop 138 on Security of ad hoc and sensor networks, P89, DOI [10.1145/1102219.1102235, DOI 10.1145/1102219.1102235]
[7]
Dutta PK, 2006, IPSN 2006: THE FIFTH INTERNATIONAL CONFERENCE ON INFORMATION PROCESSING IN SENSOR NETWORKS, P326
[8]
HUI JW, 2004, P 2 INT C EMB NETW S, P81, DOI [DOI 10.1145/1031495.1031506, 10.1145/1031495.1031506]
[9]
IEEE, 2003, 802154 IEEE
[10]
Secure routing in wireless sensor networks: Attacks and countermeasures
[J].
PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL WORKSHOP ON SENSOR NETWORK PROTOCOLS AND APPLICATIONS,
2003,
:113-127