[1] SUN B, SHAN X, WU K. Anomaly detection based secure in-network aggregation for wireless sensor networks[J]. IEEE Systems Journal, 2013,7(1):13-25. [2] SU M, YANG X, WEI L, et al. Key management scheme in WSN based on property of circle[C]//Proceedings of the 2010 International Conference on Computational Intelligence and Software Engineering, Piscataway: IEEE, 2010:1-4. [3] REN K, ZENG K, LOU W, et al. On broadcast authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2007,6(11):4136-4144. [4] BAO F, CHEN I R, CHANG M, et al. Hierarchical trust managment for wireless sensor networks and its applications to trust based routing and intrusion detection[J].IEEE Transactions on Network and Service Management, 2012,9(2):169-183. [5] LIU A, ZHENG Z, ZHANG C, et al. Secure and energy-efficient disjoint multipath routing for WSNs[J]. IEEE Transactions on Vehicular Technology, 2012,61(7):3255-3265. [6] SU C-C, CHANG K-M, KUO Y-H, et al. The new intrusion prevention and detection approaches for clustering-based sensor networks[C]//Proceedings of the 2005 IEEE Wireless Communications and Networking Conference. Piscataway: IEEE, 2005,4:1927-1932. [7] NGAI E C H. Intrusion detection for wireless sensor networks[D]. Hong Kong: The Chinese University of Hong Kong, 2005. [8] ABDUVALIYEV A, LEE S, LEE Y-K. Energy efficient hybrid intrusion detection system for wireless sensor networks[C]//Proceedings of the 2010 International Conference on Electronics and Information Engineering. Piscataway: IEEE, 2010:25-29. [9] ESTIRI M, KHADEMZADEH A. A game-theoretical model for intrusion detection in wireless sensor networks[C]//Proceedings of the 2010 23rd Canadian Conference on Electrical and Computer Engineering. Piscataway: IEEE, 2010:1-5. [10] HU H, YANG Z. Mobile-Agent-based adaptive data fusion routing algorithm in wireless sensor networks[J]. Journal of Electronics and Information Technology, 2008,30(9):2254-2258.(胡海峰,杨震.无线传感器网络中基于移动代理的自适应数据融合路由算法[J].电子与信息学报,2008,30(9):2254-2258.) [11] PANTAZIS N A, NIKOLIDAKIS S A, VERGADOS D D. Energy-efficient routing protocols in wireless sensor networks: a survey[J]. IEEE Transactions on Communications Surveys and Tutorials, 2013,15(2):551-591. [12] CHEN M, YANG L T, KWON T, et al. Itinerary planning for energy-efficient Agent communication in wireless sensor networks[J]. IEEE Transactions on Vehicular Technology, 2011, 60(7):3290-3299. [13] ADEEL M, LATIF A, MUAZ M, et al. Energy gain enhancement by ECC coded data in wireless sensor networks[C]//Proceedings of the 2012 10th International Conference on Frontiers of Information Technology. Washington, DC: IEEE Computer Society, 2012:13-17. [14] CHANG Q, ZHANG Y, QIN L. A node authentication protocol based on ECC in WSN[C]//Proceedings of the 2010 International Conference on Computer Design and Applications. Piscataway: IEEE, 2010:606-609. [15] MASADEH S R, ALJAWARNEH S, TURAB N, et al. A comparison of data encryption algorithms with the proposed algorithm: wireless security[C]//Proceedings of the 2010 6th International Conference on Networked Computing and Advanced Information Management. Washington, DC: IEEE Computer Society, 2010:341-345. [16] VERMA O P, AGARWAL R, DAFOUTI D, et al. Peformance analysis of data encryption algorithms[C]//Proceedings of the 2011 3rd International Conference on Electronics Computer Technology. Piscataway: IEEE, 2011,5:399-403. |