YEE H C and RAHAYU Y. Monitoring parking space availability via ZigBee technology[J]. International Journal of Future Computer and Communication, 2014, 3(6): 377-380. doi: 10.7763/IJFCC.2014.V3.331.
|
TSENG H W, LEE Y H, YEN L Y, et al. ZigBee (2.4 G) wireless sensor network application on indoor intrusion detection[C]. 2015 IEEE International Conference on Consumer Electronics, Taipei, China, 2015: 434-435.
|
DOUCEUR J R. The Sybil attack[C]. 1st International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA, 2002: 251-260.
|
THAKUR P, PATEL R, and PATEL N. A proposed framework for protection of identity based attack in ZigBee[C]. 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India, 2015: 628-632. doi: 10.1109/CSNT.2015.243.
|
ZHANG Q, WANG P, REEVES D S, et al. Defending against Sybil attacks in sensor networks[C]. 25th IEEE International Conference on Distributed Computing Systems Workshops, Columbus, Ohio, USA, 2005: 185-191. doi: 10.1109/ ICDCSW.2005.57.
|
NEWSOME J, SHI E, SONG D, et al. The Sybil attack in sensor networks: analysis defenses[C]. Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, California, USA, 2004: 259-268.
|
DI PIETRO R, GUARINO S, VERDE N V, et al. Security in wireless ad-hoc networksA survey[J]. Computer Communications, 2014, 51: 1-20.
|
ZENG K, GOVINDAN K, and MOHAPATRA P. Non-cryptographic authentication and identification in wireless networks[J]. IEEE Wireless Communications, 2010, 17(5): 56-62.
|
PATWARI N and KASERA S K. Robust location distinction using temporal link signatures[C]. Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking, Montral, Qubec, Canada, 2007: 111-122. doi: 10.1145/1287853.1287867.
|
LIU Y and NING P. Enhanced wireless channel authentication using time-synched link signature[C]. INFOCOM 2012 Proceedings IEEE, Orlando, FL, USA, 2012: 2636-2640.
|
XIAO L, GREENSTEIN L J, MANDAYAM N B, et al. Channel-based detection of Sybil attacks in wireless networks[J]. IEEE Transactions on Information Forensics and Security, 2009, 4(3): 492-503. doi: 10.1109/TIFS.2009. 2026454.
|
JAKES W C and COX D C. Microwave Mobile Communications[M]. Hoboken, NJ, USA, Wiley-IEEE Press, 1994: 1-69.
|
HE F, MAN H, KIVANC D, et al. EPSON: enhanced physical security in OFDM networks[C]. IEEE International Conference on Communications, Dresden, Germany, 2009: 1-5. doi: 10.1109/ICC.2009.5198999.
|
华苏重, 葛丽嘉. 相对时延在码片内的多径分离[J]. 通信学报, 2001, 22(2): 42-48.
|
HUA Suchong and GE Lijia. Separation of sub-chip multipath components[J]. Journal on Communications, 2001, 22(2): 42-48.
|
罗炬锋, 邱云周, 付耀先, 等. 研究片内多径分离技术在基于RSSI定位中的应用[J]. 电子与信息学报, 2011, 33(4): 891-895. doi: 10.3724/SP.J.1146.2010.00780.
|
LUO Jufeng, QI Yunzhou, FU Yaoxian, et al. Research on separation of subchip multipath components for RSSI-based location application[J]. Journal of Electronics Information Technology, 2011, 33(4): 891-895. doi: 10.3724/SP.J.1146. 2010.00780.
|
AKHLAQ M and SHELTAMI T R. Rtsp: an accurate and energy-efficient protocol for clock synchronization in wsns[J]. IEEE Transactions on Instrumentation and Measurement, 2013, 62(3): 578-589.
|
郁滨, 周伟伟. ZigBee同频攻击检测抑制模型研究[J]. 电子与信息学报, 2015, 37(9): 2211-2217. doi: 10.11999/JEIT141395.
|
YU Bin and ZHOU Weiwei. Co-channel attack detection and suppression model for ZigBee network nodes[J]. Journal of Electronics Information Technology, 2015, 37(9): 2211-2217. doi: 10.11999/JEIT141395.
|
罗海军, 彭卫东. 整体最小二乘法在精同步中的应用[J]. 计算机测量与控制, 2014, 22(7): 2291-2294.
|
LUO Haijun and PENG Weidong. Application of total least squares in precise synchronization[J]. Computer Measurement Control, 2014, 22(7): 2291-2294.
|