[1] Deng H M,Mukherjee A,Agrawal D P.Threshold and identity-based key management and authentication for wireless Ad Hoc networks[A].Proceedings of the International Conference on Information Technology:Coding Computing[C].New York,USA:IEEE,2004.107-111.
[2] Liu W,Nishiyama H,Ansari N,et al.A study on certificate revocation in mobile Ad Hoc networks[A].Proceedings of IEEE International Conference on Communications[C].New York,USA:IEEE,2011.1-5.
[3] Luo H,Kong J,Zerfos P,et al.URSA:ubiquitous and robust access control for mobile Ad Hoc networks[J].IEEE Transactions on Networking,2004,12(6):1049-1063.
[4] 谭良,陈菊,周明天.可信终端动态运行环境的可信证据收集机制[J].电子学报,2013,41(1):77-86. Tan L,Chen J,Zhou M T.Trustworthiness evidence collection mechanism of running dynamic environment of trusted terminal[J].Acta Electronica Sinica,2013,41(1):77-86.(in Chinese)
[5] Ganan C,Mata D J,Munoz J L.A modeling of certificate revocation and its application to synthesis of revocation traces[J].IEEE Transactions on Information Forensics and Security,2012,7(6):1673-1686.
[6] Wei L,Hiroki N,Ansari N,et al.Cluster-based certificate revocation with vindication capability for mobile Ad Hoc networks[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(2):239-249.
[7] Pushpalakshmi R,Kumar A V.A secure dominating set based routing and key management scheme in mobile Ad Hoc networks[J].Wseas Transactions on Communications,2011,10(10):297-308.
[8] Dong X L,Wang L H,Cao Z F.New public key cryptosystems with lite certification authority[DB/OL].http://ePrint.iacr.org/2006/154,2013-03-16.
[9] 张学军,王玉,王锁萍,等.基于循环移位的轻量型相互认证协议研究[J].电子学报,2012,40(11):2270-2276. Zhang X J,Wang Y,Wang S P,et al.Research on the cyclic shift lightweight mutual authentication protocol[J].Acta Electronica Sinica,2012,40(11):2270-2276.(in Chinese)
[10] 孙屹,孟晨.OPNET通信仿真开发手册[M].北京:国防科技出版社,2005.216-256.
[11] 潘勇,谢磊,徐勇军.一种传感器网络中选择性转发攻击的防御方法[P].中国专利:200810062842,2008-12-16.
[12] RFC3651,Ad Hoc on-demand distance vector (AODV) routing[S].
[13] Martinovic I,Zdarsky F A,Wilhele M,et al.Wireless client puzzles in IEEE802.11 networks:security by wireless[A].Proceedings of the 1st ACM Conference on Wireless Network Security[C].Pittsburgh,USA:ACM,2008.36-45. |