[1] 杨庚,王江涛,等.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1) :180-184. Yang Geng,Wang Jiang-tao,et al.A key establish scheme for WSN based on IBE and difie-hellman algorithms[J].Acta Electronica Sinica,2007,35(1):180-184.(in Ch inese)[2] Rui Sushmita,Nayak Amiya,Stojmenovic Ivan.Fully secure pairwise and triple key d istribution in wireless sensor networks using combinatorial designs[A].Proceed ings IEEE INFOCOM[C].USA:IEEE Press,2011.326-330.[3] Zhao Xin,Wang Xiaodong,Yu Wanrong,et al.An efficient broadcast authentication pr otocol in wireless sensor networks[J].Chinese Journal of Electronics,2009,18(2 ):368-372.[4] Ning P,Liu A,Du WL.Mitigating DoS attacks against broadcast authentication in wi reless sensor networks[J].ACM Transactions on Sensor Networks,2008,4(1):1-35.[5] Kim J,Baek J,Shon T.An efficient and scalable re-authentication protocol over w ireless sensor network[J].IEEE Transactions on Consumer Electronics,2011,57(2) :516-522.[6] Samir G,Tomasz I.Prediction-based monitoring in sensor networks:Taking lessons from MPEG[J].ACM SIGCOMM Computer Communication Review,2001,31(5):82-98.[7] Edward C,Song Han.Energy efficient residual energy monitoring in wireless sensor networks[J].International Journal of Distributed Sensor Networks,2009,(5):748 -770.[8] 艾春丽,张凤登,等.无线传感网能量监测方法研究[J].自动化仪表,2007,28(12):5-7. Ai Chunli,Zhang Fengdeng,et al.Research on energy monitoring method for wireless sensing network[J].Process Automation Instrumentation,2007,28(12):5-7.(in Ch inese)[9] 成小良,等.基于无线通信和计算特征分析的能耗模型[J].计算机研究与发展,2009,46(12) :1985-1993. Cheng XiaoLiang,et al.A model of energy consumption based on characteristic anal ysis of wireless communication and computation[J].Journal of Computer Research and Devel opment,2009,46(12):1985-1993.(in Chinese)[10] Choongill Yeh,Hyoungsoo Lim,Dongseung Kwon.IEEE C802.16d-03/92.RSSI Measurements[S].2003.[11] Bao Tie,et al.Research on trustworthiness evaluation method for domain software based on actual evidence[J].Chinese Journal of Electronics,2011,20(2):195-199.[12] Delaet S,Mandal P,Rokicki M,et al.Deterministic secure positioning in wireless s ensor networks[J].Theoretical Computer Science,2011,412(35):4471-4481.[13] Krasniewski MD,Varadharajan P,Rabeler B,et al.TIBFIT:Trust index based fault tol erance for ability data faults in sensor[A].Proceedings of the International C onference on Dependable Systems and Networks (DSN)[C].Piscataway:IEEE Computer Society,2005.672-681.[14] Tanachaiwiwat S,Dave P,Bhindwale R,et al.Location-centric isolation of misbehav ior and trust routing in energy-constrained sensor networks[A].IEEE Workshop on Energy-Efficient Wireless Communications and Networks (EWCN),in conjunction with IEEE IPCCC[C].Piscataway:IEEE Computer Society,2004.463-469.[15] 霍宏伟,等.基于室内无线传感器网络射频信号的老年人跌倒检测研究[J].电子学报,2011, 39(1):195-200. Huo Hong-wei,et al.Fall detection using radio signals of home wireless sensor n etworks[J].Acta Electronica Sinica,2011,39(1):195-200.(in Chinese)[16] Pedram,Massoud,Rabaey,Jan M.Power Aware Design Methodologies[M].Springer,2002.[17] Shangguang Wang,Qibo Sun,et al.Detecting SYN flooding attacks based on traffic prediction[J/OL].Security and Communication Networks,http://onlinelibrary.wiley.com/doi/10.1002/sec.428/abstract,24 FEB 2012,DOI:10.1002/c.428. |