[1]AKYILDIZ I F, SU W, SANKARASUBRAMANIAM Y, et al. A survey on sesnor networks[J]. IEEE Communications Magazine, 2002, 40(8): 102-114.[2]邱慧敏,杨义先. 一种安全的无线传感器网络结构的设计方案[J].北京邮电大学学报,2006,29(4):123-126.[3]YARVIS M, KUSHALNAGAR N, SNGH H, et al. Expbiting hterogeneity in sensor networks [J]. Pervasive Mobile Computing,2010,4(12): 1537-1541.[4]HEINZEIMAN W R, CHANDRAKASAN R, BALAKRISHNAN H. Energy-efficient communication protocol for wireless microsensor networks[C]// Proceedings of the 33rd Hawail International Conference on System Sciences. Washington, DC: IEEE Computer Society, 2000,8:8020.[5]NASSER N, CHEN Y F. Secure multipath routing protocol for wireless sensor networks[C]// ICDCSW07: Proceedings of the 27th International Conference on Distributed Computing Systems Workshops. Washington, DC: IEEE Computer Society, 2007: 12-12.[6]SHU T, LIU S, KRUNZ M. Data collection in wireless sensor networks using randomized dispersive routes[C]// INFOCOM'09: The 28th Conference on Computer Communications. Washington, DC: IEEE Computer Society, 2009: 2846-2850.[7]邓亚平,杨佳,胡亚明. 动态分簇的异构传感器网络安全路由协议[J]. 重庆邮电大学学报:自然科学版,2011,23(3):336-339.[8]PERRIG A, SZEWCZYK R, TYGAR J, et al. SPINS: security protocols for sensor networks[J]. ACM Wireless Network, 2002,8(5):521-534.[9]李平,林亚平,曾玮妮. 传感器网络安全研究[J]. 软件学报,2006,17(12):2577-2588.[10]BHUSE V, GUPTA A, PIDVA R. Distributed approach to security in sensornets[C]// IEEE Conference on Vehicular Technology. Piscataway, NJ: IEEE Press, 2003,5:3010-3014.[11]黄化吉,冯穗力,秦丽娇. NS2网络模拟和协议仿真[M].北京:人民邮电出版社,2010:201-222.[12]孟非,张玉杰. 改进型无线传感器网络安全分簇路由协议[J].化工自动化及仪表,2010(7):90-92.[13]IYER R, KLEINROCK L. QoS control for sensor networks[C]// Proceedings of the IEEE International Conference on Communications. Piscataway, NJ: IEEE Press, 2003: 517-521. |