[1] Akyildiz F, Su Weilian, Sankarasubramaniam Y, et al. Wireless Sensor Network: A Survey[J]. Computer Networks, 2002, 38(4): 393-422[2] 任丰原, 黄海宁, 林 闯. 无线传感器网络[J]. 软件学报, 2003, 14(7): 1282-1291.[3] Poornima A S, Amberker B B, Likith H S R, et al. Secure Data Collection in Sensor Networks Using Tree-based Key Management Scheme and Secret Sharing[C]//Proc. of 2010 International Conference on Computer Information Systems and Industrial Management Applications. Krackow, Poland: [s. n.], 2010. [4] Perrig A, Stankovic J, Wagner D. Security in Wireless Sensor Networks[J]. Communications of the ACM, 2004, 47(6): 53-57.[5] Carman D W, Kruus P S, Matt B J. Constraints and Approaches for Distributed Sensor Network Security[R]. The Security Research Division Network Associates, Inc., Tech. Rep.: 010, 2000.[6] Sierra J M, Castro J C H, Jayaram N, et al. Low Computational Cost Integrity for Block Ciphers[J]. Future Generation Computer Systems, 2004, 20(5): 857-863. [7] Chan Haowen, Perrig A, Song Dawn. Random Key Predistribution Schemes for Sensor Networks[C]//Proc. of 2003 IEEE Symposium on Security and Privacy. [S. l.]: IEEE Computer Society, 2003.[8] Du Wenliang, Deng Jing, Han Yunghsiang, et al. A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks[C]//Proc. of the 10th ACM Conference on Computer and Communications Security. New York, USA: ACM Press, 2003.[9] Delgado-Mohatar O, Fuster-Sabater A, Sierra J M. A Light-weight Authentication Scheme for Wireless Sensor Networks[J]. Ad Hoc Networks, 2011, 9(5): 727-735.[10] Menezes A, van Oorschot P, Vanstone S. Handbook of Applied Cryptography[M]. Boca Raton, USA: CRC Press, Inc., 1996. |