共 22 条
[1]
Boujelben M(2011)IKM-an identity based key management scheme for heterogeneous sensor networks J. Commun. 6 185-197
[2]
Youssef H(2009)Sensor network security: a survey IEEE Commun. Surv. Tutor. 11 52-73
[3]
Mzid R(2016)Provenance for wireless sensor networks: a survey Data Sci. Eng. 1 189-200
[4]
Abid M(2015)A lightweight secure scheme for detecting provenance forgery and packet dropattacks in wireless sensor networks IEEE Trans. Dependable Secure. Comput. 12 256-269
[5]
Chen X(2016)Hybrid energy-efficient transmission protocol for heterogeneous wireless sensor networks Circuits Syst. 7 897-660
[6]
Makki K(2016)Hybrid transmission technique with security in heterogeneous wireless sensor networks Asian J. Inf. Technol. 15 651-526
[7]
Yen K(2016)Hybrid firefly and identity-based ring signcryption scheme based secure data aggregation for clustered heterogeneous wireless sensor network Transylv. Rev. 24 7-undefined
[8]
Pissinou N(2007)On the size distribution of Poisson Voronoi cells Phys. A Stat. Mech. Appl. 385 518-undefined
[9]
Wang C(undefined)undefined undefined undefined undefined-undefined
[10]
Zheng W(undefined)undefined undefined undefined undefined-undefined