[1]LIU DONGGANG. Security mechanisms for wireless sensor networks [D]. Raleigh, NC: North Carolina State University, 2005.[2]CAPKUN S, HUBAUX J-P. Secure positioning in wireless networks [J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 221-232.[3]ZENG YINGPEI, CAO JIANNONG, HONG JUE, et al. Secure localization and location verification in wireless sensor networks [C]// IEEE 6th International Conference on Mobile Ad Hoc and Sensor Systems. Washington, DC: IEEE Computer Society, 2009: 864-869.[4]DELAET S, MANDAL P S, ROKICKI M A, et al. Deterministic secure positioning in wireless sensor networks [J]. Theoretical Computer Science, 2011, 412(35): 4471-4481.[5]刘艳文,王福豹,段渭军.无线传感器网络定位系统的设计原则与方法研究[J].计算机应用研究,2007,24(10):89-92.[6]曹晓梅,俞波,陈贵海,等.传感器网络节点定位系统安全性研究[J].软件学报,2008,19(4):869-877.[7]王福豹,史龙,任丰原.无线传感器网络中的自身定位系统和算法[J].软件学报,2005,16(5):857-866.[8]叶阿勇,马建峰,裴庆祺,等.无线传感器网络节点定位安全研究进展[J].通信学报,2009,30(10A):74-84.[9]WEI YAWEN, YU ZHEN, GUAN YONG. Location verification algorithms for wireless sensor networks [C]// Proceedings of the 27th International Conference on Distributed Computing Systems. Washington, DC: IEEE Computer Society, 2007: 70-70.[10]DU WENLIANG, FANG LEI, NING PENG. LAD: Localization anomaly detection for wireless sensor networks [J]. Journal of Parallel and Distributed Computing, 2006, 66(7): 874-886.[11]LIU DONGGANG, NING PENG, DU WENLIANG. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks [C]// ICDCS'05: 25th IEEE International Conference on Distributed Computing Systems. Washington, DC: IEEE Computer Society, 2005: 609-619.[12]SRINIVASAN A, TEITELBAUM J, WU J. DRBTS: Distributed reputation-based beacon trust system [C]// Proceedings of the 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing. Piscataway: IEEE, 2006: 277-283.[13]张依惠,许力.Ad Hoc网络中安全路由的研究[D].福州:福建师范大学,2009.[14]杨光,印桂生,杨武,等.WSNs基于信誉机制的恶意节点识别模型[J].哈尔滨工业大学学报,2009,41(10):158-162.[15]GANERIWAL S, BALZANO L K, SRIVASTAVA M B. Reputation-based framework for high integrity sensor networks [J]. ACM Transactions on Sensor Networks, 2007, 4(3): 1-36.[16]程伟明,周新运.一个用于Ad Hoc网络的分簇方法[J].计算机学报,2005,28(5):864-869.[17]杜向党,李亦洋,石秀华.无线传感器网络基于类的簇头选择算法改进[J].传感技术学报,2008,21(7):1202-1206. |