2Estrin D, Govindan R, Heidemann J, et al. Next century challenges: scalable coordination in sensor networks [ C]//Proceeding of the fifth Annual International Con- ference on Mobile Computing and Networks. Seattle, Washington, USA, 1999 : 89 - 92. 被引量:1
3Pottle G, Kaiser W. Wireless integrated network sen- sors [ C]//Communication of the ACM. New York, NY, USA, 2000 : 263 - 270. 被引量:1
4Chen Hao. Efficient compromising resilient authentica- tion schemes for large scale wireless sensor networks [ C ]//3rd ACM Conference on Wireless Network Secu- rity. Hoboken, NJ, USA,2010: 99- 102. 被引量:1
5Qin Ronghus, Sun Qi, You Xing, et al. A key man- agement scheme for manually deployed wireless sensor networks based on dual directional hash chains [ C ]// 2nd International Conference on Intelligent Systems De- sign and Engineering Applications. Sanya, China, 2012: 43(5):23 -30. 被引量:1
6Shwe Hninyu, Adachi Funiyunki. Power efficient adap- tive network coding in wireless sensor networks[C ]// IEEE International Conference on Communications. Kyoto, Japan, 2011: 5963363. 被引量:1
7Wieselthier J E, Nguyen G D, Ephremides A. Algo- rithm for energy-efficient multicasting in static ad hoc wireless networks [ J ]. Mobile Networks and Applica- tions. 2001, 6(3) : 251 -263. 被引量:1
8Singh S, Stepanek J, Raghavendra C. Power-aware broadcasting in mobile ad hoc networks[ C ]//Proceed- ings of IEEE PIMRC'99. Osaka, Japan, 1999:503 - 508. 被引量:1
9Stallings William. Cryptography and network security: principles and practices [ M ]. Prentice Hall, 2003. 被引量:1
10West D. Introduction to graph theory [M]. 2nd ed. Prentice Hall, 2001. 被引量:1