Akyildiz L F, Weilian S, Sankarasubramaniam Y, Cayirci E. A survey on sensor networks [J]. IEEE Communications Magazine, 2002, 40(8): 102-114.[2]Sourabi K, Gao J, Allawadni V, Pottie G J. Protocols for self-organization of a wireless sensor network [J].IEEE Personal Communications.2000, 7(5):16-[3]李建中, 李金宝, 石胜飞. 传感器网络及其数据管理的问题、概念与进展[J]. 软件学报, 2003, 14(10): 1718-1727.[4]Eschenauer L, Gligor V D. A key-management scheme for sensor networks [A]. The 9th ACM Conference on Computer and Communication Security (CCS) [C]. Washington DC, USA, Nov. 2002: 41-47.[5]Chen H, Perrig A, Song D. Random key pre-distribution schemes for sensor networks [A]. IEEE Symposium on Security and Privacy [C]. Berkeley, California, May 2003: 285-289.[6]李 晖, 彭志威, 陈克非. 无线传感器网络及其安全问题[J]. 中兴通讯技术, 2004,10(增刊): 30-35.[7]Tanaka S, Sato F. A key distribution and rekeying framework with totally ordered multicast protocols [A]. In Proceedings of the 15th International Conference on Information Networking [C]. Beppu City, Jun. 2001: 831-838.[8]陈 丹, 郑增威, 李际军. 无线传感器网络研究综述[J]. 计算机测量与控制, 2004, 12(8): 701-705.
|