共 30 条
[1]
Akyildiz IF(2002)A survey on sensor networks IEEE Communications Magazine 40 102-114
[2]
Su W(2003)Security and privacy in sensor networks Computer 36 103-105
[3]
Sankarasubramaniam Y(2007)On the detection of clones in sensor networks using random key predistribution IEEE Trans. Systems, Man, and Cybernetics 37 1246-1258
[4]
Cayirci E(1996)Dynamic source routing in ad hoc wireless networks Mobile Computing 353 153-181
[5]
Chan H(2008)A new approach for time synchronization in wireless wensor networks: Pairwise broadcast synchronization IEEE Trans. Wireless Communications 7 3318-3322
[6]
Perrig A(2002)SPINS: Security protocols for sensor networks Wirel. Netw. 8 521-534
[7]
Brooks R(1970)Space/time trade-offs in hash coding with allowable errors Commun. ACM 13 422-426
[8]
Govindaraju PY(2000)Summary cache: A scalable wide-area Web cache sharing protocol IEEE/ACM Trans. Networking 8 281-293
[9]
Pirretti M(1952)A method for the construction of minimum-redundancy codes Proc. I.R.E. 40 1098-1101
[10]
Vijaykrishnan N(2002)Routing security in wireless ad hoc networks Communications Magazine, IEEE 40 70-75