参考文献 [1]向亦宏,朱燕民.无线传感器网络中高效建立干扰模型的研究[J].计算机工程,2014,40(8):1-5. [2]Watro R,Kong D,Cuti S,et al.TinyPK:Securing Sensor Networks with Public Key Technology[C]//Proc-eedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks.New York,USA:ACM Press,2004:59-64. [3]Wong K H M,Zheng Yuan,Cao Jiannong,et al.A Dynamic User Authentication Scheme for Wireless Sensor Networks[C]//Proceedings of IEEE Conference on Sensor Networks,Ubiquitous,and Trustworthy Com-puting.Washington D.C.,USA:IEEE Press,2006:1-8. [4]Das M L.Two-factor User Authentication in Wireless Sensor Networks[J].IEEE Transactions on Wireless Communications,2009,8(3):1086-1090. [5]Chen T H,Shih W K.A Robust Mutual Authentication Protocol for Wireless Sensor Networks[J].ETRI Journal,2010,32(5):704-712. [6]Kumar P,Choudhury A J,Sain M,et al.RUASN:A Robust User Authentication Framework for Wireless Sensor Networks[J].Sensors,2011,11(5):5020-5046. [7]Qi Aiqin,Shen Yongjun.An Authentication Protocol Based on Chinese Remainder Theorem in Wireless Sensor Networks[C]//Proceedings of IEEE Conference Antho-logy.Washington D.C.,USA:IEEE Press,2013:1-3. [8]马力,郑国宁,孙朋.节点信任度模型的算法研究与设计[J].计算机科学,2012,39(6A):81-85. [9]Gu Chengjie,Zhang Shunyi,Feng Huibin,et al.A Novel Trust Management Model for P2P Network with Reputation and Risk Evaluation[C]//Proceedings of ICEE’10.Washington D.C.,USA:IEEE Press,2010:3544-3547. [10]Wu Guowei,Du Zhuang,Hu Yibo,et al.A Dynamic Trust Model Exploiting the Time Slice in WSNs[J].Soft Computing,2014,18(9):1829-1840. [11]Messerges T S,Dabbish E A,Sloan R H.Examining Smart-card Security Under the Threat of Power Analysis Attacks[J].IEEE Transactions on Computers,2002,51(5):541-552. [12]Shah M D,Gala S N,Shekokar N M.Lightweight Authentication Protocol Used in Wireless Sensor Net-work[C]//Proceedings of CSCITA’14.Washington D.C.,USA:IEEE Press,2014:138-143. [13]Delgado-Mohatar O,Fúster-Sabater A,Sierra J M.A Light-weight Authentication Scheme for Wireless Sensor Networks[J].Ad Hoc Networks,2011,9(5):727-735. [14]Yu Yanli,Li Keqiu,Zhou Wanlei,et al.Trust Mechanisms in Wireless Sensor Networks:Attack Analysis and Countermeasures[J].Journal of Network and Computer Applications,2012,35(3):867-880. [15]Lee C C,Hsu C W.A Secure Biometric-based Remote User Authentication with Key Agreement Scheme Using Extended Chaotic Maps[J].Nonlinear Dynamics,2013,71(1/2):201-211. 编辑金胡考 |