3[3]Hartung C.Node compromise in sensor networks:the need for secure systems[R].Technical report CU-CS-988-04,University of Colorado at Boulder,2004. 被引量:1
4[4]Chris Karlof and David Wagner.Secure routing in wireless sensor networks:attacks and countermeasures[C].Proceedings of first IEEE international workshop on sensor network protocols and applications,May 2003. 被引量:1
5[5]John Paul Walters.Wireless sensor network security:asurvey[EB/OL].http://wwwedit.cs.wayne.edu/weisong/papers/walters05-wsn-security-survey.pdf,2006-2-7. 被引量:1
6[6]Newsome J.The sybil attack in sensor networks:analysis & defense[C].Proceedings of the third international symposium on information proceeding in sensor networks.ACM press,2004:259-268. 被引量:1
7[7]Fei Hu and et al.Secure wireless sensor networks:problems and solutions[EB/OL].http://cs.uiowa.edu/-kghoshda/rs/security/hu.pdf,2006-2-7. 被引量:1
8[8]Zhu Sencun.LEAP:efficient security mechanisms for large-scale distributed sensor networks[C].In the proceedings of the 10th ACM conference on computer and communications security,Oct.,2003:62-72. 被引量:1
9[9]Anderson R and Huhn M.Low cost attack on tamper resistant devices[C].IWSP:International workshop on security protocols,LNCS,1997:125-136. 被引量:1
10[10]Chris Karlof,Naveen Sastry,David Wagner.TinySec:a link layer security architecture for wireless sensor networks[C].Proceedings of ACM SensSys 2004,Nov.,2004. 被引量:1