[1] 维基百科. RSA加密算法[EB/OL].[2020-03-01]. https://wiki.hk.xileso.top/wiki/RSA. (Wikipedia. RSA encryption algorithm[EB/OL].[2020-03-01]. https://wiki.hk.xileso.top/wiki/RSA.) [2] 袁猷南, 杨明慧, 游林. 一种新的基于部署知识的WSN密钥分配方案[J]. 传感技术学报,2011,24(5):752-757.(YUAN Y N, YANG M H,YOU L. A novel scheme of key distribution based on the deployment knowledge of WSN[J]. Journal of Sensor Technology,2011,24(5):752-757.) [3] 张冰涛, 王小鹏. 基于ECC的无线传感器网络安全分簇算法[J]. 兰州交通大学学报,2016,35(1):20-24.(ZHANG B T, WANG X P. ECC-based security clustering algorithm for wireless sensor network[J]. Journal of Lanzhou Jiaotong University,2016, 35(1):20-24.) [4] 吴昆, 魏国珩. 无线传感器网络安全认证技术研究[J]. 通信技术,2019,52(6):1461-1468. (WU K,WEI G H. Security authentication technology of wireless sensor network[J]. Communications Technology,2019,52(6):1461-1468.) [5] 李发根, 钟笛. 数字签密综述[J]. 信息网络安全,2011(12):1-8. (LI F G,ZHONG D. A survey of digital signcryption[J]. Netinfo Security,2011(12):1-8.) [6] 何炎祥, 孙发军, 李清安, 等. 无线传感器网络中公钥机制研究综述[J]. 计算机学报,2020,43(3):381-408.(HE Y X,SUN F J,LI Q A,et al. A survey on public key mechanism in wireless sensor networks[J]. Chinese Journal of Computers,2020,43(3):381-408.) [7] OLIVEIRA L B,DAHAB R,LÓPEZ J,et al. Identity-based encryption for sensor networks[C]//Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications Workshops. Piscataway:IEEE,2007:290-294. [8] 秦志光, 刘京京, 赵洋, 等. 密钥隔离密码系统研究现状[J]. 计算机学报,2015,38(4):759-774.(QIN Z G,LIU J J,ZHAO Y, et al. A survey of key-insulated cryptography[J]. Chinese Journal of Computers,2015,38(4):759-774.) [9] 陈渊, 叶清, 李墨泚. 无线传感器网络中基于身份的加密算法研究[J]. 计算机应用与软件,2015,32(12):302-304,309. (CHEN Y,YE Q,LI M C. Identity-based encryption algorithm in wireless sensor networks[J]. Computer Applications and Software, 2015,32(12):302-304,309.) [10] 危蓉, 赵德正. 基于身份的无线传感器网络层簇式密钥管理方案[J]. 武汉大学学报(工学版),2015,48(4):580-583,590. (WEI R,ZHAO D Z. Key-management scheme based on identity and cluster layer for wireless sensor network[J]. Engineering Journal of Wuhan University,2015,48(4):580-583,590.) [11] 郭江鸿, 李兴华, 武坚强. 一个新的基于身份的无线传感器网络密钥协商方案[J]. 计算机科学,2011,38(3):127-130. (GUO J H,LI X H,WU J Q. New identity-based key agreement scheme for WSN[J]. Computer Science,2011,38(3):127-130.) [12] 郭萍, 张宏, 傅德胜, 等. 一种混合轻量型无线传感器网络公钥密码方案[J]. 计算机科学,2012,39(1):69-72.(GUO P,ZHANG H,FU D S,et al. Hybrid and lightweight cryptography for wireless sensor network[J]. Computer Science, 2012, 39(1):69-72.) [13] YUAN C,CHEN W,ZHU Y,et al. A lowcomputationalcomplexity authentication scheme in underwater wireless sensor network[C]//Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks. Piscataway:IEEE,2015:116-123. [14] 李英磊, 吴韶波, 黄茂源. 基于ECDH算法的WSN密钥研究[J]. 科技通报,2018,34(7):119-123.(LI Y L,WU S B, HUANG M Y. Research on key of WSN based on ECDH algorithm[J]. Bulletin of Science and Technology,2018,34(7):119-123.) [15] ROHBANIAN M R,KHARAZMI M R,KESHAVARZ-HADDAD A,et al. Watchdog-LEACH:a new method based on LEACH protocol to secure clustered wireless sensor networks[J]. ACSIJ Advances in Computer Science,2013,2(3):105-117. [16] 董发志, 丁洪伟, 杨志军, 等. 基于遗传算法和模糊C均值聚类的WSN分簇路由算法[J]. 计算机应用,2019,39(8):2359-2365. (DONG F Z,DING H W,YANG Z J,et al. WSN clustering routing algorithm based on genetic algorithm and fuzzy C-means clustering[J]. Journal of Computer Applications,2019, 39(8):2359-2365.) [17] 邓绍江, 王宇, 田袁, 等. 基于EBS的分组分层WSN密钥管理策略[J]. 计算机工程,2013,39(9):64-68.(DENG S J,WANG Y,TIAN Y,et al. Grouping and layered key management strategy in WSN based on EBS[J]. Computer Engineering,2013,39(9):64-68.) [18] CMU Monarch Project. Simulator basics[EB/OL].[2020-03-01]. https://www.isi.edu/nsnam/ns/doc-stable/node28.html. |