Computer Science ›› 2019, Vol. 46 ›› Issue (2): 102-108.doi: 10.11896/j.issn.1002-137X.2019.02.016
• Information Security • Previous Articles Next Articles
WANG Jun1,2, ZHU Zhi-wei2, LIU Jun-jie1,2
CLC Number:
[1]牟思,殷虹,苏醒.无线传感网络技术与应用[M].北京:中国水利水电出版社,2016:1-243. [2]DAS S,MILLER D R,KAUFMAN Y,et al.Introduction to Wireless Sensor Networks[M]∥Wireless Sensor and Mobile Ad-Hoc Networks.New York:Springer,2015:1-18. [3]ZHANG L.Research on Wireless Sensor Network Routing Protocol Based on Energy Equilibrium[C]∥International Confe-rence on Frontiers of Manufacturing Science & Measuring Technology.2017. [4]KOZMA W,LAZOS L.REAct:resource-efficient accountability for node misbehavior in ad hoc networks based on random audits[C]∥ACM Conference on Wireless Network Security(WISEC 2009).Zurich,Switzerland,2009:103-110. [5]GUPTA S,KAR S,DHARMARAJA S.BAAP:Blackhole at- tack avoidance protocol for wireless network[C]∥International Conference on Computer and Communication Technology.2011:468-473. [6]WAZID M,KATAL A,SACHAN R S,et al.Detection and prevention mechanism for Blackhole attack in Wireless Sensor Network[C]∥International Conference on Communications and Signal Processing.IEEE,2013:576-581. [7]AAD I,HUBAUX J P,KNIGHTLY E W.Denial of service resilience in ad hoc networks[C]∥Proceedings of the 10th Annual International Conference on Mobile Computing and Networking.ACM,2004:202-215. [8]DENG H,LI W,AGRAWAL D P.Routing security in wireless ad hoc networks[J].IEEE Communications Magazine,2002,40(10):70-75. [9]AL-SHURMAN M,YOO S M,PARK S.Black hole attack in mobile Ad Hoc networks[C]∥Southeast Regional Conference,2004.Huntsville,Alabama,USA,2004:96-97. [10]SHANG X H.Research on Location Algorithm of Wireless Sensor Network Based on DV-Hop[D].Jilin:Jilin University,2012.(in Chinese) 尚小航.基于DV-Hop的无线传感器网络定位算法研究[D].吉林:吉林大学,2012. [11]LAZOS L,POOVENDRAN R,MEADOWS C,et al.Preventing wormhole attacks on wireless ad hoc networks:a graph theoretic approach[C]∥Wireless Communications and Networking Conference.2015. [12]ABDELSHAFY M A, KING P J B.Resisting blackhole attacks on MANETs[C]∥IEEE Consumer Communications & Networking Conference.IEEE,2016:1048-1053. [13]宋成明,赵文,常浩.计算机网络安全原理与技术研究[M].北京:中国水利水电出版社,2015. [14]LI J,CHEN X,LI M,et al.Secure Deduplication with Efficient and Reliable Convergent Key Management[J].IEEE Transactions on Parallel & Distributed Systems,2014,25(6):1615-1625. |
[1] | Cheng-biao,DING Hong-wei,DONG Fa-zhi,YANG Zhi-jun, BAO Li-yong. Low-delay and Low-power WSN Clustering Algorithm Based on LEACH XIONG [J]. Computer Science, 2020, 47(1): 258-264. |
[2] | ZHANG Ting, ZHANG De-gan, CUI Yu-ya, CHEN Lu, GE Hui. New Method of Multi-path Reliable Transmission Based on Redundancy Strategy [J]. Computer Science, 2019, 46(11A): 363-368. |
[3] | WU Wei-nan, LIU Jian-ming. Dynamic Retransmission Algorithm inLow-power Wireless Sensor Networks [J]. Computer Science, 2018, 45(6): 96-99. |
[4] | NI Ying-bo, CHEN Yuan-yan, YE Juan, WANG Ming. Improvement of DV-Hop Algorithm Based on Multiple Communication Radii and Cosine Theorem [J]. Computer Science, 2018, 45(11A): 320-324. |
[5] | GE Bin, DAI Chen, JI Jie-qu and WU Bo. Grouping-based Wireless Sensor Network Multi-rounds Clustering Routing Algorithm [J]. Computer Science, 2017, 44(Z6): 305-308. |
[6] | WANG Gang, SUN Liang-xu, ZENG Zi-wei and YANG Dan. Secure and Efficient Hybrid Key Management Mechanism in Heterogeneous WSN [J]. Computer Science, 2016, 43(7): 153-156. |
[7] | CAO Xiang-yi, ZENG Bi and HE Cui-hong. Research for ETX Routing Metric of RPL [J]. Computer Science, 2016, 43(4): 102-105. |
[8] | SUN Cong, ZHU Yi-hua, CHI Kai-kai and YUAN Li-yong. Borrowing Address within Two-hop Neighbors in Mesh Network [J]. Computer Science, 2016, 43(3): 107-112. |
[9] | XING Rong-hua and HUANG Hai-yan. Researches on Wireless Sensor Network Localization Based on Improved Gbest-guided Artificial Bee Colony Algorithm [J]. Computer Science, 2016, 43(12): 273-276. |
[10] | WANG Jun, DU Wei-qi, LIU Hui and WANG Lei. Multipath Routing Protocol Based on Braid-multipath Network Coding Model for Wireless Sensor Networks [J]. Computer Science, 2016, 43(11): 135-141. |
[11] | LIU Lin-feng, GUO Ping, ZHAO Juan and LI Ning. Data Collection Strategy Based on Improved LEACH Protocol [J]. Computer Science, 2015, 42(Z6): 299-302. |
[12] | LIU Jian-ming and ZHAO Ri-ji. Research of Wireless Sensor Network Routing Algorithm Based on Improved Ant Colony Algorithm [J]. Computer Science, 2015, 42(Z6): 107-111. |
[13] | CHEN Tian-tian, JIANG Bing, XUE Xiao-qing and SHA Ting-ting. Clustering Routing Algorithm for Wireless Sensor Network along River [J]. Computer Science, 2015, 42(Z11): 227-230. |
[14] | HU Bing SUN Zhi-xin. Overview of Time Synchronization in Wireless Sensor Networks [J]. Computer Science, 2015, 42(7): 1-4. |
[15] | FENG Hui-ying, ZHOU Liang and DING Qiu-lin. Data Stream and Network Coding-based Data Aggregation Algorithm in Wireless Sensor Networks [J]. Computer Science, 2015, 42(5): 136-141. |
|