共 196 条
[21]
Barani F, 2014, 2014 IRANIAN CONFERENCE ON INTELLIGENT SYSTEMS (ICIS)
[23]
A ranging based scheme for detecting the wormhole attack in wireless sensor networks
[J].
Journal of China Universities of Posts and Telecommunications,
2012, 19 (SUPPL. 1)
:6-10
[25]
Brands S., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P344
[27]
Capkun S., 2003, ACM WORKSHOP SECURIT, P21
[29]
TCABRP: A Trust-Based Cooperation Authentication Bit-Map Routing Protocol Against Insider Security Threats in Wireless Ad Hoc Networks
[J].
IEEE SYSTEMS JOURNAL,
2017, 11 (02)
:449-459
[30]
Chiu HS, 2006, INTERNATIONAL SYMPOSIUM ON WIRELESS PERVASIVE COMPUTING 2006, CONFERENCE PROGRAM, P149