WANG Yong YUAN Chaoyan TANG Jing HU Liangliang. Low-power secure localization algorithm based on distributed reputation evaluation[J]. Journal of Computer Applications, 2013, 33(07): 1802-1808.
[1]钱雷.无线传感器网络节点安全定位研究[D].合肥:中国科学技术大学,2010.[2]许力.无线传感器网络的安全和优化[M].北京:电子工业出版社,2010: 191-230.[3]MEADOWS C, POOVENDRAN R, PAVLOVIC D, et al. Distance bounding protocols: authentication logic analysis and collusion attacks [C]// Secure Localization and Time Synchronization for Wireless Sensor and Ad Networks. Berlin: Springer-Verlag, 2007: 279-298.[4]CAPKUN S, HUBAUX J-P. Secure positioning in wireless networks [J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2):221-232. [5]LAZOS L, POOVENDRAN R. HiRLoc: high-resolution robust localization for wireless sensor networks [J]. IEEE Journal on Selected Areas in Communication,2006,24(2):233-246.[6]ZHANG Y, LIU W, FANG Y, et al. Secure localization and authentication in ultra-wideband sensor networks [J]. IEEE Journal on Selected Areas in Communications, 2006, 24(4):829-835.[7]靖刚,吴俊敏,徐宏力.基于对称密码的无线传感器网络安全定位[J].计算机工程,2009,35(12):117-119.[8]张聚伟.孙雨耕.基于部署信息的无线传感器网络密钥管理方案[J].计算机工程,2009,35(6):145-147.[9]杨光,印桂生,杨武,等.WSNs基于信誉机制的恶意节点识别模型[J].哈尔滨工业大学学报,2009,41(10):158-162.[10]SRINIVASAN A,TEITELBAUM J,WU J. DRBTS: Distributed reputation-based beacon trust system [C]// Proceedings of the 2nd IEEE International Symposium on Dependable,Autonomic and Secure Computing. Piscataway: IEEE, 2006:277-283.[11]凌远景,叶阿勇,许力,等.基于声誉机制的传感器网络节点安全定位算法[J].计算机应用,2012,32(1):70-73.[12]于满洋.基于恶意信标节点检测的WSNs 安全定位技术研究[D].哈尔滨:哈尔滨工程大学,2011.[13]廖鹰,齐欢,王晓红,等.基于距离和分布的无线传感器网络分簇算法[J].华中科技大学学报,2012,40(6):29-33.