参考文献 [1]Wang Yong,Aattebury G,Ramamurthy B.A Survey of Security Issues in Wireless Sensor Networks[J].IEEE Communications Surveys & Tutorials,2006,8(2):1-23. [2]张玉泉.无线传感器网络安全问题研究[M].1版.济南:山东人民出版社,2013. [3]裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-118. [4]范红.数字签名技术及其在网络信息安全中的应用[J].中国科学院研究生院学报,2001,18(2):101-104. [5]王丽琴,杨晓元,黎茂堂.基于双线性对的WSN 密钥管理和认证方案[J].计算机应用研究,2009,26(11):4302-4305. [6]Lu Huang,Li Jie,Mohsen G.Secure and Efficient Data Trans-mission for Cluser-Based Wireless Senor Networks[J].IEEE Transactions on Parallel and Distributed Systems,2014,25(3):750-761. [7]Lu Huang,Li Jie,Kameda H.A Secure Routing Protocol for Cluster-based Wireless Sensor Networks Using ID-based Digital Signature[C]//Proceedings of IEEE GLOBECOM’10.Washington D.C.,USA:IEEE Press,2010:1-5. [8]Predeepa K,Anne W R,Duraisamy S.Design and Implementation Issues of Clustering in Wireless Sensor Networks[J].Computer Applications,2012,47(11):23-28. [9]BanerjeeP,Jacobson D,Lahiri S.Security and Performance Analysis of a Secure Clustering Protocol for Sensor Networks[C]//Proceedings of the 6th IEEE International Symposium on Network Computing and Applications.Washington D.C.,USA:IEEE Press,2007:145-152. [10]Carlo B,Santis A D,Shay K,et al.Perfectly-secure Key Distribution for Dynamic Conferences[C]//Proceedings of IEEE CRYPTO’93.Washington D.C.,USA:IEEE Press,1993:471-486. [11]Wan Zhiguo,Ren Kui,Preneel B.A Secure Privacy-preserving Roaming Protocol Based on Hierarchical Identity-based Encryption for Mobile Networks[C]//Proceedings of the 1st ACM Conference on Wireless Network Security.New Yrok,USA:ACM Press,2008:62-67. [12]He Daojing,Chen Chun,Bu Jiajun.SDRP:A Secure and Distributed Reprogramming Protocol for Wireless Sensor Networks[J].IEEE Transactions on Industrial Electronics,2012,59(11):4155-4163. [13]Shamir A.Identity-based Cryptosystems and Signature Schemes[C]//Proceedings of IEEE CRYPTO’85.Washington D.C.,USA:IEEE Press,1985:47-53. [14]Song Hui,Zhu Sencun,Zhang Wensheng,et al.Least Pri-vilege and Privilege Deprivation:Toward Tolerating Mobile Sink Compromises in Wireless Sensor Networks[C]//Proceedings of MobiHoc’05.New Yrok,USA:ACM Press,2005:378-389. (下转第128页) (上接第122页) [15]Wang Haodong,Li Qun.Distributed User Access Control in Sensor Networks[C]//Proceedings of IEEE International Conference on Distributed Computing in Sensor Systems.San Franciso,USA:IEEE Press,2006:305-320. [16]He Daojing,Chen Chun,Bu Jiajun,et al.Analysis and Im-provement of a Secure and Efficient Handover Authentication for Wireless Networks[J].IEEE Communications,2012,16(8):1270-1273. [17]Rahman M,Khatib K E.Secure Time Synchronization for Wireless Sensor Networks Based on Bilinear Pairing Functions[J].IEEE Transactions on Parallel and Distributed Systems,2010(19):14-25. [18]Sun Kun,Ning Peng,Wang Chen,et al.TinySeRSync:Secure and Resilient Time Synchronization in Wireless Sensor Networks[C]//Proceedings of ACM Conference on Computer and Communications Security.New Yrok,USA:ACM Press,2006:264-277. [19]冯承天.从求解多项式方程到阿贝尔不可能性定理:细说五次方程无求根公式[M].1版.上海:华东师范大学出版社,2014. [20]Heinzelman W B,Chandrakasana A P,Balakrishnan H.An Application-specific Protocol Architecture for Wireless Microsensor Networks[J].IEEE Transactions on Wireless Communications,2002,1(4):660-670. 编辑索书志 |