[1]LUK M, PERRIG A, WHILLOCK B. Seven cardinal properties of sensor network broadcast authentication [C]// SASN'06: Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2006: 147-156.[2]PERRIG A, SZEWCZYK R, TYGAR J D, et al. SPINS: security protocols for sensor networks [J]. Wireless Networks, 2002, 8(5): 521-534.[3]WATRO R, KONG D, CUTI S-F, et al. TinyPK: securing sensor networks with public key technology [C]// Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004: 59-64.[4]MALAN D J, WELSH M, SMITH M D. A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography [C]// Proceedings of the 1st IEEE International Conference on Sensor and Ad Hoc Communications and Networks. Piscataway: IEEE Press, 2004: 71-80.[5]BAUER K, LEE H. A distributed authentication scheme for a wireless sensing system [J]. ACM Transactions on Information and System Security, 2008, 11(3): 1-35.[6]di PIETRO R, SORIENTE C, SPOGNARDI A, et al. Collaborative authentication in unattended WSNs [C]// WiSec'09: Proceedings of the Second ACM Conference on Wireless Network Security. New York: ACM Press, 2009: 237-244.[7]BONEH D, FRANKLIN M. Identity-based encryption from the Weil pairing [C]// Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer-Verlag, 2001: 213-229.[8]OLIVEIRA L B, DAHAB R, LOPEZ J, et al. Identity-based encryption for sensor networks [C]// Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops. Piscataway: IEEE Press, 2007: 290-294.[9]OLIVEIRA L B, SCOTT M, LOPEZ J, et al. TinyPBC: pairings for authenticated identity-based non-interactive key distribution in sensor networks [J]. Computer Communications, 2011, 34(3): 485-493.[10]YASMIN R, RITTER E, WANG G. An authentication framework for wireless sensor networks using identity-based signatures [C]// Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology. Piscataway: IEEE Press, 2010: 882-889.[11]庞辽军,焦李成,王育民.无线传感器网络节点间认证及密钥协商协议[J].传感技术学报,2008,21(8):1422-1426.[12]李聪,闫德勤,郑宏亮.标准模型下高效安全的基于身份多签密方案[J].计算机应用,2012,32(4):957-959.[13]赵秀凤,徐秋亮.一个有效的多PKG环境下基于身份签密方案[J].计算机学报,2012,35(4):673-681.[14]王潮,胡广跃,张焕国.无线传感器网络的轻量级安全体系研究[J].通信学报,2012,33(2):30-35.[15]YUSSOFF Y M, HASHIM H, BABA M D. Identity-based trusted authentication in wireless sensor networks [J]. International Journal of Computer Science Issues, 2012, 9(2): 1694-0814.[16]GRAWROCK D. TCG specification architecture overview [EB/OL]. [2012-12-15]. http://www.trustedcomputinggroup.org/resources/tcg_architecture_overview_version_14. [17]JSANG A, ISMAIL R. The Beta reputation system [C]// Proceedings of the 15th Bled Electronic Commerce Conference. Bled, Slovenia: Electronic Commerce Center Press, 2002: 41-55.[18]GANERIWAL S, SRIVASTAVA M B. Reputation-based framework for high integrity sensor networks [C]// SASN'04: 〖HJ1.4mm〗Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2004: 66-77.[19]肖德琴,冯健昭,杨波,等.基于无线传感器网络的信誉形式化模型[J].计算机科学,2007,34(6): 84-87.[20]AHMED M R, HUANG X, SHARMA D. A novel misbehavior evaluation with Dempster-Shafer theory in wireless sensor networks [C]// MobiHoc'12: Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York: ACM Press, 2012: 259-260.[21]蹇波,郭永辉,罗长远,等.基于ECC的无线传感器网络密钥管理协议[J].计算机工程,2010,36(3):142-144. |