[1] | 孙利民, 李建中, 陈渝, 等. 无线传感器网络[M].北京:清华大学出版社, 2006.SUN Limin, LI Jianzhong, CHEN Yu, et al. Wireless Sensor Network[M]. Beijing:Tsinghua University, 2006. (in Chinese) |
[2] | Yick J, Mukherjee B, Ghosal D. Wireless sensor network survey[J]. Computer Networks, 2008, 52(12):2292-2330. |
[3] | 李晓维. 无线传感器网络技术[M]. 北京:北京理工大学出版社, 2007.LI Xiaowei. Wireless sensor network technology[M]. Beijing:Beijing University of Technology Press, 2007.(in Chinese) |
[11] | Zhang G H, Poon C C, Zhang Y T. Analysis of using interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J], IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176-182.<br /> |
[4] | 王擎. 无线传感器网络路由技术研究[D]. 西安:西安电子科技大学, 2009.WANG Qing. Research on the Routing Technology of Wireless Sensor Networks[D]. Xi'an:Xi Dian University, 2009. (in Chinese) |
[5] | 崔莉, 鞠海玲, 苗勇, 等。无线传感器网络研究进展[J]. 计算机研究与发展, 2005, 42(1):163-174.CUI Li, JU Hailing, MIAO Yong, et al. Research on progress in wireless sensor network[J]. Computer Research and Development, 2005, 42(1):163-174. (in Chinese) |
[12] | 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科学技术大学, 2009. YANG Feng, Research on Malicious Node Protection Technology in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2009. (in Chinese)<br /> |
[13] | 欧阳熹. 基于节点信誉的无线传感器网络安全关键技术研究[D]. 北京:北京邮电大学, 2013. (in Chinese)OUYANG Xi. Research on Reputation-based Security Technologies of Wireless Sensor Networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. (in Chinese)<br /> |
[6] | Pandey A, Tripathi R C. A survey on wireless sensor networks security[J]. International Journal of Computer Applications, 2010, 3(2):43-49. |
[14] | 张芹. 无线传感器网络环境下的节点可信技术研究[D]. 南京:南京邮电大学, 2011.ZHANG Qin. Research of Trust Node Technology in Wireless Sensor Network[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2011. (in Chinese)<br /> |
[7] | Prasad D, Gupta M, Patel R B. A reliable security model irrespective of energy constraints in wireless sensor networks[J]. International Journal of Advanced Computer Sciences and Applications, 2011, 2(4):2156-5570. |
[15] | Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length[J]. Journal of Network and Computer Applications, 2011, 34(4):1138-1149.<br /> |
[8] | Boujelben M, Youssef H, Mzid R, et al. Self-healing key, distribution schemes for wireless networks:A survey[J]. The Computer Journal, 2011, 54(4):449-569. |
[16] | Conti M, Pietro R D, Mancini L V, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698. |
[9] | LUO Hanjiang, WU Kaishun, GUO Zhongwen, et al. Ship detection with wireless sensor networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(7):1336-1343. |
[10] | ZHANG Ting, HE Jingsha, LI Xiaohui, et al. A signcryption-based secure localization scheme in wireless sensor networks[J]. Physics Procedia, 2012, 33:58-264. |
[11] | Zhang G H, Poon C C, Zhang Y T. Analysis of using interpulse intervals to generate 128-Bit biometric random binary sequences for securing wireless body sensor networks[J], IEEE Transactions on Information Technology in Biomedicine, 2012, 16(1):176-182. |
[12] | 杨峰. 无线传感器网络恶意节点防范技术研究[D]. 合肥:中国科学技术大学, 2009. YANG Feng, Research on Malicious Node Protection Technology in Wireless Sensor Networks[D]. Hefei:University of Science and Technology of China, 2009. (in Chinese) |
[13] | 欧阳熹. 基于节点信誉的无线传感器网络安全关键技术研究[D]. 北京:北京邮电大学, 2013. (in Chinese)OUYANG Xi. Research on Reputation-based Security Technologies of Wireless Sensor Networks[D]. Beijing:Beijing University of Posts and Telecommunications, 2013. (in Chinese) |
[14] | 张芹. 无线传感器网络环境下的节点可信技术研究[D]. 南京:南京邮电大学, 2011.ZHANG Qin. Research of Trust Node Technology in Wireless Sensor Network[D]. Nanjing:Nanjing University of Posts and Telecommunications, 2011. (in Chinese) |
[15] | Wang J, Liu Y, Jiao Y. Building a trusted route in a mobile ad hoc network considering communication reliability and path length[J]. Journal of Network and Computer Applications, 2011, 34(4):1138-1149. |
[16] | Conti M, Pietro R D, Mancini L V, et al. Distributed detection of clone attacks in wireless sensor networks[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(5):685-698. |
[1] | 苘大鹏, 王臣业, 杨武, 王巍, 玄世昌, 靳小鹏. 低能耗的无线传感器网络隐私数据融合方法[J]. 清华大学学报(自然科学版), 2017, 57(2): 213-219. | [2] | 付俊松, 刘云. 基于信誉系统及数据噪声点检测技术的无线传感器网络节点安全模型[J]. 清华大学学报(自然科学版), 2017, 57(1): 24-27. | [3] | 谭金华, 石京. 浓雾下高速公路双车道间断放行措施[J]. 清华大学学报(自然科学版), 2016, 56(9): 985-990. | [4] | 廖理, 梁昱, 张伟强. 谁在中国股票市场中“博彩”?——基于个人投资者交易数据的实证研究[J]. 清华大学学报(自然科学版), 2016, 56(6): 677-684. | [5] | 李舟军, 吴春明, 王啸. 基于沙盒的Android应用风险行为分析与评估[J]. 清华大学学报(自然科学版), 2016, 65(5): 453-460. | [6] | 李丽华, 马亚萍, 丁宁, 张辉, 马晔风. 应急疏散中社会关系网络与“领导-追随”行为变化[J]. 清华大学学报(自然科学版), 2016, 56(3): 334-340. | [7] | 奇格奇, 吴建平, 杜怡曼, 贾宇涵. 快速城镇化背景下的驾驶风格多样性分析[J]. 清华大学学报(自然科学版), 2016, 56(12): 1320-1326. | [8] | 龙奋杰, 王萧濛, 邹迪. 基于标尺竞争的地方政府土地出让行为互动[J]. 清华大学学报(自然科学版), 2015, 55(9): 971-976,983. | [9] | 刘念雄, 莫丹, 王牧洲, 张敬南. 城市家庭居住碳排放的社会-技术分析方法与应用[J]. 清华大学学报(自然科学版), 2015, 55(9): 933-939. | [10] | 蔡劼, 顾明. 基于IEEE 802.15.4的星形拓扑无线传感器网络性能分析[J]. 清华大学学报(自然科学版), 2015, 55(5): 565-571. | [11] | 陈元琳, 柴跃廷, 刘义, 徐扬. 基于群体偏好的交易评价可信度[J]. 清华大学学报(自然科学版), 2015, 55(5): 558-564,571. | [12] | 周沧琦, 赵千川, 卢文博. 基于兴趣变化的微博用户转发行为建模[J]. 清华大学学报(自然科学版), 2015, 55(11): 1163-1170. | [13] | 孙立远, 管晓宏. 在线社会网络多话题传播竞争特性的测量[J]. 清华大学学报(自然科学版), 2015, 55(11): 1157-1162. | [14] | 杨殿阁, 何长伟, 李满, 何奇洸. 基于支持向量机的汽车转向与换道行为识别[J]. 清华大学学报(自然科学版), 2015, 55(10): 1093-1097. | [15] | 何平, 吴添, 姜磊, 伍良杰. 投资者情绪与个股波动关系的微观检验[J]. 清华大学学报(自然科学版), 2014, 54(5): 655-663. |
|