[1]
王良民,李菲,熊书明,等.无线传感器网络内部攻击检测方法研究[J].计算机科学,2011,38(4):97-99,129.
[2]
KARLOF C,WAGNER D.Secure routing in wireless sensor networks:attacks and countermeasures[C]// 2003 IEEE International Workshop on Sensor Network Protocols and Applications. [S.l.]:IEEE,2003:113-127.
[3]
NIDAL N, CHEN YUNFENG.SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks [J].Computer Communications,2007,30(11/12):2401-2412.
[4]
ESTIRI M,KHADEMAZADEH A.A game-theoretical model for intrusion detection in wireless sensor networks [C]// 2010 23rd Canadian Conference on Electrical and Computer Engineering. Washington,DC:IEEE Computer Society,2010:1-5.
[5]
YU BO,XIAO BIN.Detecting selective forwarding attacks in wireless sensor networks [C]// IPDPS06: Proceedings of 20th International Parallel and Distributed Processing Symposium.Rhodes Island, Greece:IEEE Press,2006:25-29.
[6]
XIAO BIN,YU BO,GAO CHUANSHAN.CHEMAS:Identify suspect nodes in selective forwarding attacks [J].Journal of Parallel and Distributed Computing,2007,67(11):1218-1230.
[7]
SUN HUNG-MIN, CHEN C-M, HSIAO Y-C. An efficient countermeasure to the selective forwarding attack in wireless sensor networks[C]// Proceedings of the IEEE Region 10 Conference.Taipei:IEEE, 2007:1-4.
[8]
LEE S-B,CHOI Y-H.A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks[C]// Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks.New York:ACM,2006:59-70.
[9]
王新胜,詹永照,王良民.无线传感器网络选择性传递攻击协同防御方法[J].江苏大学学报:自然科学版,2011,32(4):449-455.
[10]
HAI T H, HUH E N. Detecting selective forwarding attacks in wireless sensor networks using two-hops neighbor knowledge[C]// 2008 Seventh IEEE International Symposium on Network Computing and Applications.Washington, DC:IEEE Computer Society, 2008: 325-331.
[11]
LEE H Y,CHO T H. Fuzzy-based reliable data delivery for countering selective forwarding in sensor networks[C]// Proceedings of the 4th International Conference on Ubiquitous Intelligence and Computing:Building Smart Worlds in Real and Cyber Spaces, LNCS 4611.Heidelberg:Springer-Verlag,2007:535-544.
[12]
马锋,潘勇.一种规避传感器网络选择性转发攻击的方法[J].电子设计工程,2011,19(2l):159-162.
[13]
江长勇,张建明,王良民.无线传感器网络中的选择转发攻击检测[J].计算机工程,2009,35(21):140-143.
[14]
方震,赵湛,郭鹏,等.基于RSSI测距分析[J].传感技术学报,2007,20(11):2526-2530.
[15]
李光林,朱怡安.基于最优转发策略的无线传感器网络随机路由协议[J].计算机工程与设计,2010,31(17):3803-3806.
[16]
宋飞.无线传感器网络安全路由机制的研究[D].合肥:中国科学技术大学,2009. |