[1]李端端, 曾子维, 潘晓红, 等. 无线传感器网络克隆攻击检测协议[J]. 计算机工程, 2009, 35(16): 161-163, 166. [2]Zahariadis T, Leligou H C, Trakadas P, et al. Trust Management in Wireless Sensor Networks[J]. European Transactions on Tele- communications, 2010, 21(4): 386-395. [3]Zhang Qing, Yu Ting, Ning Peng. A Framework for Identifying Compromised Nodes in Wireless Sensor Networks[J]. ACM Transactions on Information and System Security, 2008, 11(3): 1-37. [4]Shaikh R A, Jameel H, Auriol B J, et al. Intrusion-aware Alert Validation Algorithm for Cooperative Distributed Intrusion Detection Schemes of Wireless Sensor Networks[J]. Sensors, 2009, 9(8): 5989-6007. [5]Parno B, Perrig A, Gligor V. Distributed Detection of Node Replication Attacks in Sensor Networks[C]//Proceedings of IEEE Symposium on Security and Privacy. Oakland, USA: IEEE Press, 2005: 49-63. [6]Ho J W, Wright M, Das S K. Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis[C]// Proceedings of INFOCOM’09. Rio de Janeiro, Brazil: IEEE Press, 2009: 1773-1781. [7]Pietro R D, Oligeri G, Soriente C, et al. Intrusion Resilience in Mobile Unattended WSNs[C]//Proceedings of INFOCOM’10. San Diego, USA: IEEE Press, 2010: 2303-2311. [8]Mariano G, Zahariadis T, Alvarez F, et al. Secure Geographic Routing in Ad Hoc and Wireless Sensor Networks[C]//Proceedings of Conference on Wireless Communications and Networking. New York, USA: Hindawi Publishing Corp., 2010. [9]Ho J W, Liu Donggang, Wright M, et al. Distributed Detection of Replica Node Attacks with Group Deployment Knowledge in Wireless Sensor Networks[J]. Ad Hoc Network, 2009, 7(8): 1476-1488.
|