[1] 任秀丽,杨威,薛建生,等.基于分区的无线传感器网节点复制攻击检测方法[J].电子学报,2010,38(9):2095-2100. Ren Xiu-li,Yang Wei,Xue Jian-sheng,et al.Method of detecting the replication attack based on zoning in wireless sensor networks[J].Acta Electronica Sinica,2010,38(9):2095-2100.(in Chinese)
[2] Newsome J,Shi E,Song D,et al.The Sybil attack in sensor networks:Analysis & defenses[A].Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks[C].New York:ACM,2004.259-268.
[3] Manjula V,Chellappan C.The replication attacks in wireless sensor networks:Analysis and defenses[A].Proceedings of the 1st International Conference on Computer Science and Information Technology[C].Heidelberg:Springer Verlag,2011.169-178.
[4] Zhu W T,Zhou J Y,Deng R H,et al.Detecting node replication attacks in wireless sensor networks:A survey[J].Journal of Network and Computer Applications,2012,35(3):1022-1034.
[5] Parno B,Perrig A,Gligor V.Distributed detection of node replication attacks in sensor networks[A].Proceedings of the 2005 IEEE Symposium on Security and Privacy[C].New Jersey:IEEE,2005.49-63.
[6] Ho J W,Liu D G,Wright M,et al.Distributed detection of replica node attacks with group deployment knowledge in wireless sensor networks[J].Ad hoc Networks,2009,7(8):1476-1488.
[7] Ho J W,Liu D G,Wright M,et al.Distributed detection of replicas with deployment knowledge in wireless sensor networks[A].Proceedings of the 7th Annual IEEE International Conference on Pervasive Computing and Communications[C].New Jersey:IEEE CS,2009.1-6.
[8] Demirbas M,Song Y.An RSSI-based scheme for Sybil attack detection in wireless sensor networks[A].Proceedings of the International Symposium on a World of Wireless,Mobile and Multimedia Networks[C].New Jersey:IEEE CS,2006.564-568.
[9] Wang J T,Yang G,Sun Y,et al.Sybil attack detection based on RSSI for wireless sensor network[A].Proceedings of the International Conference on Wireless Communications,Networking and Mobile Computing[C].New Jersey:IEEE CS,2007.2684-2687.
[10] Wang W T,Ssu K F,Chang W C.Defending Sybil attacks based on neighboring relations in wireless sensor networks[J].Security and Communication Networks,2010,3(5):408-420.
[11] Zhang Y C,Liu W,Lou W J,et al.Securing sensor networks with location-based keys[A].Proceedings of the 2005 IEEE Wireless Communications and Networking[C].New Jersey:IEEE,2005.1909-1914.
[12] Zhang Y C,Liu W,Lou W J,et al.Location-based compromise-tolerant security mechanisms for wireless sensor networks[J].IEEE Journal on Selected Areas in Communications,2006,24(2):247-260.
[13] Duan M J,Xu J.An efficient location-based compromise-tolerant key management scheme for sensor networks[J].Information Processing Letters,2011,111(11):503-507.
[14] Bekara C,Laurent-Maknavicjus M.A new protocol for securing wireless sensor networks against nodes replication attacks[A].Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing,Networking and Communications[C].New Jersey:IEEE CS,2007.1-7.
[15] Zhang Q H,Wang P,Reeves D S,et al.Defending against Sybil attacks in sensor networks[A].Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops[C].New Jersey:IEEE CS,2005.185-191.
[16] Yin J,Madria S K.Sybil attack detection in a hierarchical sensor network[A].Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks[C].New Jersey:IEEE CS,2007.494-503.
[17] Shokri R,Poturalski M,Ravot G,et al.A practical secure neighbor verification protocol for wireless sensor networks[A].Proceedings of the 2nd ACM Conference on Wireless Network Security[C].New York:ACM,2009.193-200.
[18] 杨峰,周学海,张起元,等.无线传感器网络恶意节点溯源追踪方法研究[J].电子学报,2009,37(1):202-206. Yang Feng,Zhou Xue-hai,Zhang Qi-yuan,et al.A practical traceback mechanism in wireless sensor networks[J].Acta Electronica Sinica,2009,37(1):202-206.(in Chinese)
[19] 杨庚,王江涛,程宏兵,等.基于身份加密的无线传感器网络密钥分配方法[J].电子学报,2007,35(1):180-184. Yang Geng,Wang Jiang-tao,Cheng Hong-bing,et al.A key establish scheme for WSN based on IBE and Diffie-Hellman algorithms[J].Acta Electronica Sinica,2007,35(1):180-184.(in Chinese)
[20] Barreto P,Lynn B,Scott M.On the selection of pairing-friendly groups[A].Proceedings of the 10th Annual International Workshop on Selected Areas in Cryptography[C].Heidelberg:Springer-Verlag,2003.17-25. |