[1] ZHOU Y, FANG Y, ZHANG Y. Securing wireless sensor networks: a survey[J]. IEEE Communications Surveys and Tutorials, 2008,10(3):6-28. [2] HAO J, ZHANG B, MOUFTAH H T. Routing protocols for duty cycled wireless sensor networks: a survey[J]. IEEE Communications Magazine, 2012,50(12):116-123. [3] AHMAD SALEHI S, RAZZAQUE M A, NARAEI P, et al. Security in wireless sensor networks: issues and challenges[C]//Proceedings of the 2013 IEEE International Conference on Space Science and Communication. Piscataway: IEEE, 2013:356-360. [4] ABDELHAKIM M, LIGHTFOOT L E, REN J, et al. Distributed detection in mobile access wireless sensor networks under Byzantine attacks[J]. IEEE Transactions on Parallel and Distributed Systems, 2014,25(4):950-959. [5] MARTINS D, GUYENNET H. Wireless sensor network attacks and security mechanisms: a short survey[C]//Proceedings of the 2010 13th International Conference on Network-based Information Systems. Piscataway: IEEE, 2010:313-320. [6] DENG J, HAN R, MISHRA S. Countermeasures against traffic analysis attacks in wireless sensor networks[C]//Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks. Piscataway: IEEE, 2005:113-126. [7] LOCKE G, GALLAGHER P. Digital Signature Standard (DSS)[EB/OL].[2014-10-05]. http://www.docin.com/p-434165217.html. [8] BLACK J R. Message authentication codes[D]. Davis: University of California at Davis, 2000. [9] ROMAN R, ZHOU J, LOPEZ J. Applying intrusion detection systems to wireless sensor networks[C]//Proceedings of the 2006 3rd IEEE Consumer Communications and Networking Conference. Piscataway: IEEE, 2006:640-644. [10] VASSEUR J P, AGARWAL N, HUI J, et al. RPL: the IP routing protocol designed for low power and lossy networks[J]. IPSO Alliance, 2011,13(6):120-127. [11] VASSEUR J-P, DUNKELS A. Interconnecting smart objects with IP: the next Internet[M]. San Francisco: Morgan Kaufmann. 2010:112-120. [12] CASADO L, TSIGAS P. Contikisec: a secure network layer for wireless sensor networks under the contiki operating system[EB/OL].[2014-08-06]. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.149.6598&rep=rep1&type=pdf. |