[1] 郭云, 高铁杠. 基于LEACH协议的安全路由设计与分析[J]. 计算机工程与应用, 2011, 47(13): 66-71. Guo Yun, Gao Tiegang. Design and analysis about security based on LEACH routing protocol [J]. Computer Engineering and Applications, 2011, 47(13): 66-71.[2] Chen Jiehui, Salim M B, Matsumoto M. A Novel clustering scheme for sensor networks based on intra-cluster connectivity[C]//New Technologies, Mobility and Security, 2011, 4th IFIP International Conference. Paris: IEEE Press, 2011: 1-4.[3] Laurent E, Virgil D G. A key management scheme for distributed sensor networks[C]//Proceedings of the 9th ACM Conference on Computer and Communication Security. Washington, DC: IEEE Press, 2002, 11: 41-47.[4] 沈金波, 许力, 张美平, 等. 基于簇的无线传感器网络密钥预分配方案[J]. 武汉大学学报: 理学版, 2009, 55(1): 117-120. Shen Jinbo, Xu Li, Zhang Meiping, et al. Cluster-based key pre-distribution scheme for wireless sensor networks[J]. Journal of Wuhan University: Natural Science Edition, 2009, 55(1): 117-120.[5] Wang Yong, Ramamurthy B, Zon Xukai. An efficient key revocation scheme for wireless sensor networks[C]//IEEE International Conference on Communications. Glasgow: IEEE Communication Society, 2007: 1260-1265.[6] Raymond D, Midkiff F. Denial of service in wireless sensor network: attacks and dsfenwses[J]. IEEE Pervasice Compting, 2008, 7(1): 74-81.[7] Jokhio S H, Jokhio A, Kemp A H. Node capture attack detection and defence in wireless sensor networks[J]. The Institution of Engineering and Technology, 2012, 2(3): 161-169.[8] 邓宏贵, 施佳佳. 基于分簇的无线传感器网络密钥预分配方案[J]. 计算机仿真, 2010(9): 128-131. Deng Honggui, Shi Jiajia. Research of the pre-distribution scheme of the wireless sensor network key base on cluster[J]. Computer Simulation, 2010(9): 128-131.[9] Perrig A, Szewczyk R, Tygar J. SPINS: security protocols for sensor networks [J]. ACM Wireless Network, 2002, 8(5): 521-53.[10] 李涛. 无线传感器网络密钥预分配算法研究[J]. 计算机仿真, 2011(7): 150-153. Li Tao. Key pre-distribution method based on clusters for WSN[J]. Computer Simulation, 2011(7): 150-153. |