暂无分享,去创建一个
[1] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[2] Hermann de Meer,et al. Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..
[3] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[4] Ning Hu,et al. Security for fixed sensor networks , 2004, ACM-SE 42.
[5] John A. Stankovic,et al. Security in wireless sensor networks , 2004, SASN '04.
[6] Ian F. Akyildiz,et al. Sensor Networks , 2002, Encyclopedia of GIS.
[7] Fei Hu,et al. Security considerations in ad hoc sensor networks , 2005, Ad Hoc Networks.
[8] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[9] Weisong Shi,et al. Wireless Sensor Network Security: A Survey , 2006 .
[10] Rajeev Shorey,et al. Mobile, Wireless and Sensor Networks: Technology, Applications and Future Directions , 2005 .
[11] David Boyle,et al. Securing Wireless Sensor Networks: Security Architectures , 2008, J. Networks.
[12] I. Khemapech,et al. A Survey of Wireless Sensor Networks Technology , 2005 .
[13] Biswanath Mukherjee,et al. Wireless sensor network survey , 2008, Comput. Networks.
[14] Petr Svenda,et al. Smart Dust Security - Key Infection Revisited , 2006, STM.