[1] YUN Y S, XIA Y, BEHDANI B, et al. Distributed algorithm for lifetime maximization in a delay-tolerant wireless sensor network with a mobile Sink[J]. IEEE Transactions on Mobile Computing, 2013, 12(10):1920-1930. [2] BEHDANI B, SMITH J C, XIA Y. The lifetime maximization problem in wireless sensor networks with a mobile sink:mixed-integer programming formulations and algorithms[J]. LIE Transactions, 2013, 45(10):1094-1113. [3] Trust Computing Group. TPM main part 1:design principles specification, version 1.2 revision 62[S]. Geneva:International Organization for Standardization (IOS), 2009. [4] YANG Y, FONOAGE M I, CARDEI M. Improving network lifetime with mobile wireless sensor networks[J]. Computer Communications, 2010, 33(4):409-419. [5] VUPPUTURI S, RACHURI K K, MURTHY C S R. Using mobile data collectors to improve network lifetime of wireless sensor networks with reliability constraints[J]. Journal of Parallel & Distributed Computing, 2010, 70(7):767-778. [6] ZHANG J, LI X, MA J, et al. Secure and efficient authentication scheme for mobile sink in WSNs based on bilinear pairings[J]. International Journal of Distributed Sensor Networks, 2014, 2014(1):84-88. [7] 王良民, 姜顺荣, 郭渊博. 物联网中移动Sensor节点漫游的组合安全认证协议[J]. 中国科学信息科学, 2012, 42(7):815-830.(WANG L M, JIANG S R, GUO Y B. Composable-secure authentication protocol for mobile sensors roaming in the Internet of things[J]. Science China Information Sciences, 2012, 42(7):815-830.) [8] 周彦伟, 杨波. 物联网移动节点直接匿名漫游认证协议[J]. 软件学报, 2015, 26(9):2436-2450. (ZHOU Y W, YANG B. Provable secure authentication protocol with direct anonymity for mobile nodes roaming service in Internet of things[J]. Journal of Software, 2015,26(9):2436-2450.) [9] DAS M L. Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2009, 8(3):1086-1090. [10] CHEN T H, SHIH W K. A robust mutual authentication protocol for wireless sensor networks[J]. ETRI Journal, 2010, 32(5):704-712. [11] 杨力,马建峰,朱建明.可信的匿名无线认证协议[J].通信学报, 2009, 30(9):29-35. (YANG L, MA J F, ZHU J M. Trusted and anonymous authentication scheme for wireless networks[J]. Journal on Communications, 2009, 30(9):29-35.) [12] 周彦伟,杨波,张文政.可证安全的移动互联网可信匿名漫游协议[J].计算机学报,2015, 38(4):733-748. (ZHOU Y W, YANG B, ZHANG W Z. Provable secure trusted and anonymous roaming protocol for mobile Internet[J]. Chinese Journal of Computers, 2015, 38(4):733-748.) [13] RAYA M, HUBAUX J P. Securing vehicular Ad Hoc networks[C]//Proceedings of the 2nd International Conference on Pervasive Computing and Applications. Amsterdam:IOS Press, 2007:424-429. [14] CANETTI R, KRAWCZYK H. Analysis of key-exchange protocols and their use for building secure channels[C]//Proceedings of the 2001 International Conference on the Theory and Application of Cryptographic Techniques:Advances in Cryptology. London:Springer-Verlag, 2001:453-474. [15] TIN Y S T, VASANTA H, BOYD C, et al. Protocols with security proofs for mobile applications[C]//Proceedings of the 9th Australasian Conference on Information Security and Privacy. Berlin:Springer, 2004:358-369. [16] 侯惠芳,季新生,刘光强.异构无线网络中基于标识的匿名认证协议[J].通信学报,2011, 32(5):153-161. (HOU H F, JI X S, LIU G Q. Identity-based anonymity authentication protocol in the heterogeneous wireless network[J]. Journal on Communications, 2011, 32(5):153-161.) [17] 侯惠芳,刘光强,季新生,等.基于公钥的可证明安全的异构无线网络认证方案[J]. 电子与信息学报, 2009, 31(10):2385-2391.(HOU H F, LIU G Q, JI X S. Provable security authentication scheme based on public key for heterogeneous wireless network[J]. Journal of Electronics & Information Technology, 2009, 31(10):2385-2391.) |