[1] ZENG W, LIN Y, YU J, et al. Privacy-preserving data aggregation scheme based on the p-function set in wireless sensor networks [J]. Ad Hoc and Sensor Wireless Networks, 2014, 21(1/2): 21-58. [2] WANG R, QIN Z, WANG J. Analysis of wireless sensor network cluster routing protocol [J]. Journal of University of Electronic Science and Technology of China, 2013, 42(3): 400-405.(王瑞锦,秦志光,王佳昊.无线传感器网络分簇路由协议分析[J].电子科技大学学报,2013,42(3):400-405.) [3] BEN-OTHMAN J, YAHYA B. Energy efficient and QoS based routing protocol for wireless sensor networks [J]. Journal of Parallel and Distributed Computing, 2010, 70(8): 849-857. [4] CHEN T, YANG Z, LIU Y, et al. Localization-oriented network adjustment in wireless Ad Hoc and sensor networks [J]. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(1): 146-155. [5] CHEN Z, WANG L. Heuristic anti-monitoring path searching algorithm in sensory field [J]. Journal of Computer Applications, 2008, 28(11): 2767-2770.(陈喆,王雷.传感环境下一种启发式反监控路径搜索算法[J].计算机应用,2008,28(11):2767-2770.) [6] VELTRI G, HUANG Q, QU G. Minimal and maximal exposure path algorithms for wireless embedded sensor networks [C]// SenSys'03: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. New York: ACM, 2003: 40-50. [7] GUSRIALDI A, HIRCHE S, HATANAKA T, et al. Voronoi based coverage control with anisotropic sensors [C]// Proceedings of the 2008 American Control Conference. Piscataway: IEEE, 2008: 736-741. [8] RAHMAN M O, HONG C S. Probabilistic exposure identification for wireless sensor network [C]// Proceedings of the 26th KIPS Fall Conference. Piscataway: IEEE, 2006: 1359-1362. [9] MEGUERDICHIAN S, KOUSHANFAR F, QU G, et al. Exposure in wireless Ad-Hoc sensor networks [C]// Proceedings of the 7th Annual International Conference on Mobile Computing and Networking. New York: ACM, 2001: 139-150. [10] MEGUERDICHIAN S, KOUSHANFAR F, POTKONJAK M, et al. Coverage problems in wireless Ad-Hoc sensor networks [C]// INFOCOM 2001: Proceedings of the Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway: IEEE, 2001, 3: 1380-1387. [11] PHIPATANASUPHORN V, RAMANATHAN P. Vulnerability of sensor networks to unauthorized traversal and monitoring [J]. IEEE Transactions on Computers, 2004, 53(3): 364-369. [12] ZHANG W, LI M, WU M. An algorithm for target traversing based on local Voronoi tessellation [J]. Journal of Software, 2007, 18(5): 1246-1253.(张文哲,李明禄,伍民友.一种基于局部Voronoi图的目标穿越算法[J].软件学报,2007,18(5):1246-1253.) [13] XU H, WANG L. Anti-monitor algorithm for mobile anisotropic sensor network [J]. Computer Engineering, 2010, 36(11): 111-113.(许海林,王雷.可移动各向异性传感器网络的反监控算法[J].计算机工程,2010,36(11):111-113.) |