[1] 崔莉, 鞠海玲, 苗勇, 等. 无线传感器网络研究进展[J].计算机研究与发展, 2005, 42(1): 163-174. [2] Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks[J]. Communications of the ACM, 2004, 47(6): 53-57. [3] Ye F, Luo H, Lu S, Zhang L. Statistical en-route filtering of injected false data in sensor networks[J]. IEEE Journal on Selected Areas in Communication, 2005, 23(4): 839-850. [4] Zhu S, Setia S, Jajodia S, et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks[C]// Proceedings of the 25th IEEE Symposium on Security and Privacy. Washington, USA: IEEE Press, 2004: 259-271. [5] Ma M. Resilience of sink filtering scheme in wireless sensor networks[J]. Computer Communications, 2006, 30(1): 55-65. [6] Yuan T, Zhang S Y, Zhong Y P, et al. KAEF:An en-route scheme of filtering false data in wireless sensor networks[C]// IEEE International Performance Computing and Communications Conference. Austin, USA: IEEE Press, 2008: 193-200. [7] Yu Z, Guan Y. A dynamic en-route scheme for filtering false data[C]// Proceedings of the 3rd ACM International conference on Embedded Networked Sensor Systems. Barcelona, Spain: ACM Press, 2005: 294-295. [8] Yang H, Ye F, Yuan Y, et al. Toward resilient security in wireless sensor networks[C]// Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Urbana-Champaign, USA: ACM Press, 2005: 34-45. [9] Yu L,Li J Z. Grouping-based resilient statistical en-route filtering for sensor networks[C]// Proceedings of 28th International Conference on Computer and Communications, Joint Conference of the IEEE Computer and Communications Societies. Rio de Janeiro, Brazil: IEEE Press, 2009: 1 782-1 790. [10] Marti S, Giuli T, Lai K, et al. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks[C]// Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. Boston, USA: ACM Press, 2000: 255-265. [11] Zhu S, Setia S, Jajodia S. LEAP: Efficient security mechanisms for large-scale distributed sensor networks[C]// Proceedings of the 10th ACM Conference on Computer and Communications Security. Washington, USA: ACM Press, 2003: 62-72. [12] Lee S B, Choi Y H. A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks[C]// Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks. Alexandria, USA: ACM Press, 2006: 59-70. |