1LAW Y W, HAVINGA P J M. How to secure a wireless sensor network [C]// Proceedings of the 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing. [S.I.] .. IEEE, 2005 .. 89-95. 被引量:1
2PERRIG Adrian, STANKOVIC John, WAGNER David. Security inwireless sensor networks [J]. Communications of the ACM, 2009, 47(6) : 53-57. 被引量:1
4GUIMARAES G, SOUTO E, SADOK D, et al. Evaluation of security mechanisms in wireless sensor networks [C]// Proceedings of the 2011 Systems Communications. [S.1.] .- IEEE, 2011 : 428-433. 被引量:1
5VOGT H, RINGWALD M, STRASSER M. Intrusion detection and failure recovery in sensor nodes [C]// Proceedings of 2008 Tagungsband Informatik. Heidelberg, Germany : Springer-Verlag, 2008 : 161-163. 被引量:1
6HARTUNG C, BALASALLE J, HAN R. Node compromise in sensor networks : the need for secure systems [D]. USA : Department of Computer Science, University of Colorado at Boulder, 2005. 被引量:1
7MISHRA A, NADKARNI K, PATCHA A. Intrusion detection in wireless Ad hoc networks [J]. IEEE Wireless Communications, 2012, 11(1) : 48-60. 被引量:1
8LIU Dong-gang, NING Peng, DU Wen-liang. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks [C]// Proceedings of the 25th IEEE International Conference on Distributed Computing Systems. [S.I.] .. IEEE, 2009 : 609-619. 被引量:1
9ONAT I, M1RI A. An intrusion detection system for wireless sensor networks [C]//IEEE International Conference on Wireless and Mobile Computing, Networking and Communications. [S.I.] : IEEE, 2012, 3 : 253-259. 被引量:1
10SESHADRI A, PERRIG A, VAN DOORN L, et al. SWATT: softWare-based attestation for embedded devices [C]// Proceedings of the 2012 IEEE Symposium on Security and Privacy, 2012 : 272- 282. 被引量:1