参考文献
[1] 任丰原, 黄海宁, 林 闯. 无线传感器网络[J]. 软件学报, 2003, 14(7): 1282-1291.
[2] 苏 忠, 林 闯, 封富君, 等. 无线传感器网络密钥管理的方案和协议[J]. 软件学报, 2007, 18(5): 1218-1231.
[3] 朱凌志, 赵巾帼, 刘志雄, 等. 无线传感器网络中虚假数据过滤方案[J]. 计算机应用研究, 2012, 18(5): 1218-1231.
[4] Ye Fan, Luo Haiyun, Zhang Lixia. Statistical En-route Filter- ing of Injected False Data in Sensor Networks[J]. IEEE Journal on Selected Areas in Communications, 2005, 23(4): 839-850.
[5] Zhou Li, Ravishankar C V. A Fault Localized Scheme for False Report Filtering in Sensor Networks[C]//Proc. of International Conference on Pervasive Services. Santorini, Greece: IEEE Press, 2005: 59-68.
[6] Zhang Yutao, Yang Jun, Vu H T. The Interleaved Authen- tication for Filtering False Reports in Multipath Routing Based Sensor Network[C]//Proc. of the 20th International Conference on Parallel and Distributed Processing. Washington D. C., USA: IEEE Computer Society, 2006: 112- 121.
[7] Zhu Senchun, Setia S, Jajodia S. An Interleaved Hop-by-hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks[C]//Proc. of IEEE Symposium on Security and Privacy. [S. l.]: IEEE Press, 2004: 259-271.
[8] Yu Lei, Li Jianzhong. Grouping-based Resilient Statistical En-route Filtering for Sensor Networks[C]//Proc. of the 28th Annual Joint Conference on Computer and Communications Societies. Rio de Janeiro, Brazil: IEEE Press, 2009: 1782- 1790.
[9] Yang Feng, Zhou Xuehai, Zhang Qiyuan. Multi-dimensional Resilient Statistical En-route Filtering in Wireless Sensor Networks[J]. Journal of Internet Technology, 2011, 12(1): 130-139.
[10] Naresh K, Pradeep K P, Sathish K S. An Active En-route Filtering Scheme for Information Reporting in Wireless Sensor Networks[J]. International Journal of Computer Science and Information Technology, 2011, 2(4): 1812-1819.
[11] Feng J, Potkonjak M. Real-time Watermarking Techniques for Sensor Networks[C]//Proc. of IEEE International Conference on Security and Watermarking of Multimedia Contents. [S. l.]: IEEE Press, 2003: 391-402.
[12] Ren Kui, Lou Wenjing, Zhang Yanchao. Providing Location- aware End-to-end Data Security in Wireless Sensor Networks[J]. IEEE Transactions on Mobile Computing, 2008, 7(5): 585-598.
编辑 陆燕菲
|