Kohanbash D, Kantor G, and Martin T, et al.. Wireless sensor network design for monitoring and irrigation control: user-centric hardware and software development[J]. HortTechnology, 2013, 23(6): 725-734.
|
Park Y T, Sthapit P, and Pyun J Y. Energy efficient data fragmentation for ubiquitous computing[J]. The Computer Journal, 2014, 57(2): 263-272.
|
Padmavathi G and Shanmugapriya D. A survey of attacks, security mechanisms and challenges in wireless sensor networks[J]. International Journal of Computer Science and Information Security, 2009, 4(1/2): 1-9.
|
Wang X and Li Y. An improved SIR model for analysing the dynamics of worm propagation in wireless sensor networks[J]. Chinese Journal of Electronics, 2009, 18(1): 8-12.
|
司海飞, 杨忠, 王珺. 无线传感器网络研究现状与应用[J]. 机电工程, 2011, 28(1): 16-20.
|
Si H, Yang Z, and Wang J. Review on research status and application of wireless sensor networks[J] Journal of Mechanical Electrical Engineering, 2011, 28(1): 16-20.
|
钱志鸿, 王义君. 面向物联网的无线传感器网络综述[J]. 电子与信息学报, 2013, 35(1): 215-227.
|
Qian Z and Wang Y. Internet of things-oriented wireless sensor networks review[J] Journal of Electronics Information Technology, 2013, 35(1): 215-227.
|
Wang X, Yang L, and Chen K. Sleach: secure low-energy adaptive clustering hierarchy protocol for wireless sensor networks[J]. Wuhan University Journal of Natural Sciences, 2006, 10(1): 127-131.
|
Chen X, Yang Z, and Cheng H. Unequal clustering mechanism of leach protocol for wireless sensor networks[C]. 2009 WRI World Congress on Computer Science and Information Engineering, IEEE, Los Angeles, CA, USA, 2009, 1: 258-262.
|
Perrig A, Szewczyk R, and Tygar J D, et al.. Spins: security protocols for sensor networks[J]. Wireless Networks, 2002, 8(5): 521-534.
|
Ye M, Li C, Chen G, et al.. EECS: an energy efficient clustering scheme in wireless sensor networks[C]. 24th IEEE International Performance, Computing, and Communications Conference, Phoenix, AZ, USA, 2005: 535-540.
|
黄振海, 赖晓龙, 铁满霞, 等. 三元对等鉴别及访问控制方法国际提案进展[J]. 信息技术与标准化, 2009(6): 21-23.
|
Huang Z, Lai X, and Tie M, et al.. The progress of Tri- element Peer Authentication (TePA) and access control method[J]. Information Technology Standardization, 2009(6): 21-23.
|
Das M L. Two-factor user authentication in wireless sensor networks[J]. IEEE Transactions on Wireless Communi- cations, 2009, 8(3): 1086-1090.
|
Gu Y, Ji Y, Chen H, et al.. TAPEMAN: towards an optimal data gathering mechanism in wireless sensor networks[J]. Chinese Journal of Electronics, 2013, 19(4): 594-598.
|
Kumar P, Choudhury A J, Sain M, et al.. RUASN: a robust user authentication framework for wireless sensor networks[J]. Sensors, 2011, 11(5): 5020-5046.
|