[1] LI Yulong,LIU Renren,ZHAO Jinfeng,et al.Data collection method in clustering sensing network based on compressive sensing[J].Computer Engineering,2018,44(10):129-135.(in Chinese) 李玉龙,刘任任,赵津锋,等.分簇感知网络中基于压缩感知的数据收集方法[J].计算机工程,2018,44(10):129-135. [2] SHI Jian.Overview of wireless sensor network broadcast certification[J].Journal of Henan Science and Technology,2014(11):3-5.(in Chinese) 石坚.无线传感器网络广播认证综述[J].河南科技,2014(11):3-5. [3] WU Kun,WEI Guoheng.Security authentication technology of wireless sensor network[J].Communications Technology,2019,52(6):1461-1468.(in Chinese) 吴昆,魏国珩.无线传感器网络安全认证技术研究[J].通信技术,2019,52(6):1461-1468. [4] PERRIG A,SZEWCZYK R,TYGAR J D,et al.SPINS:security protocols for sensor networks[J].Wireless Networks,2002,8(5):521-534. [5] AL DHAHERI A,YEUN C Y,DAMIANI E.New two-level TESLA protocol for IoT environments[C]//Proceedings of 2019 IEEE World Congress on Services.Washington D.C.,USA:IEEE Press,2019:84-91. [6] HUANG Haiping,GONG Tianhe,CHEN Tao,et al.An improved mu TESLA protocol based on queuing theory and benaloh-leichter SSS in WSNs[J].Journal of Sensors,2016(9):1-13. [7] LIU Y S,LI J,GUIZANI M.PKC based broadcast authentication using signature amortization for WSNs[J].IEEE Transactions on Wireless Communications,2012,11(6):2106-2115. [8] ROMAN R,ALCARAZ C.Applicability of public key infrastructures in wireless sensor networks[C]//Proceedings of the 4th European Conference on Public Key Infrastructure:Theory and Practice.Berlin,Germany:Springer,2007:313-320. [9] BENZAID C,LOUNIS K,AL-NEMRAT A,et al.Fast authentication in wireless sensor networks[J].Future Generation Computer Systems,2016,55:362-375. [10] SHIM K A.BASIS:a practical multi-user broadcast authentication scheme in wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2017,12(7):1545-1554. [11] ISLAM S H,BISWAS G P.Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings[J].Journal of King Saud University-Computer and Information Sciences,2014,26(1):89-97. [12] GUO Rui,WEN Qiaoyan,JIN Zhengping,et al.An efficient and provably-secure broadcast authentication scheme in wireless sensor networks[J].Journal of Internet Technology,2015,16(6):977-985. [13] MAHMOOD K,CHAUDHRY S A,NAQVI H,et al.An elliptic curve cryptography based lightweight authentication scheme for smart grid communication[J].Future Generation Computer Systems,2018,81:557-565. [14] CHAVAN K,GUPTA I,KULKARNI D.A review on solving ECDLP over large finite field using parallel pollard's Rho(ρ) method[J].IOSR Journal of Computer Engineering,2016,18(2):1-11. [15] AL-RIYAMI S S,PATERSON K G.Certificateless public key cryptography[M].Berlin,Germany:Springer,2003:452-473. [16] HUANG X Y,MU Y,SUSILO W,et al.Certificateless signatures:new schemes and security models[J].The Computer Journal,2012,55(4):457-474. [17] IEEE:Standard 802.15.4-2006:wireless medium access control and physical layer specifications for low-rate wireless personal area networks[EB/OL].[2019-06-10].https://standards.ieee.org/standard/802_15_4-2006.html. [18] HEO J S,OK K S,KIM K C.Public key techniques for prevention of resource exhaustion attack in wireless sensor networks[J].Advanced Materials Research,2013,740:159-163. [19] SHIM K A.BASIS:a practical multi-user broadcast authentication scheme in wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2017,12(7):1545-1554. [20] JIA X Y,HE D B,LIU Q,et al.An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment[J].Ad Hoc Networks,2018,71:78-87. |