2S. Yi, E Naldurg, R. Kravets. Security-aware ad hoc routing for wireless networks[C]. Proc. of 2001 ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2001, pp.299-302. 被引量:1
4Swades De .Chunming Qiao, Hongyi Wu. Meshed multipath routing with selective forwarding: an efficient strategy in wireless sensor networks[M]. 被引量:1
5Sasikanth Avancha, Je.rey Underco.er, Anupam Joshi, John Pinkston. Secure sensor networks for perimeter protection[M]. 被引量:1
6A. Perrig, R. Szewczyk, V. Wen, D. Culler, J.D. Tygar. SPINS:security protocols for sensor networks[J]. Wireless Networks 8 (2002)521-534. 被引量:1
7W.R. Heinzelman, J. Kulik, H. Balalkrishnan. Adaptive protocols for information dissemination in wireless sensor networks[C].Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom_99), Seattle, WA,August 1999, pp. 174-185. 被引量:1
8J. Li, ,1. ,lannotti, D. Couto, D. Karger. R. Morris, A scalable location service for geographic ad hoc routing[C]. ACM Mobicom,2000. 被引量:1
9Ahmed Helmy. Mobility assisted resolution of queries in large scale mobile sensor networks MARQ[J]. Computer Networks, 43(2003) 437458. 被引量:1
10Koen Langendoen, Niels Reijers. Distributed localization in wireless sensor networks: a quantitative comparison[J]. Computer Networks, 43 (2003) 499-518. . 被引量:1