Computer Science ›› 2017, Vol. 44 ›› Issue (Z6): 326-332.doi: 10.11896/j.issn.1002-137X.2017.6A.075
Previous Articles Next Articles
XIONG Zi-li, HAN Lan-sheng, XU Xing-bo, FU Cai and LIU Bu-yu
[1] PERRIG A,STANKOVIC J,WAGNER D.Security in wireless sensor networks[J].Communications of ACM,2004,47(6):53-57. [2] 裴庆祺,沈玉龙,马建峰.无线传感器网络安全技术综述[J].通信学报,2007,28(8):113-122. [3] PING Y,HAO X J,YUE W,et al.Distributed intrusion detection for mobile ad hoc networks[J].Journal of Systems Engineering and Electronics,2008,19(4):851-859. [4] LIAO H J,LIN C H R,LIN Y C,et al.Intrusion detection system:A comprehensive review[J].Journal of Network and Computer Applications,2013,36(1):16-24. [5] KAVITHA T,SRIDHARAN D.Security vulnerabilities in wireless sensor networks:A survey[J].Journal of information Assurance and Security,2010,5(1):31-44. [6] YAN K Q,WANG S C,LIU C W.A hybrid intrusion detection system of cluster based wireless sensor networks[C]∥Procee-ding of the International Multi Conference of Engineers and Computer Scientists.2009,1:18-20. [7] ALRAJEH N A,KHAN S,SHAMS B.Intrusion detection systems in wireless sensor networks:a review[J].International Journal of Distributed Sensor Networks,2013,2013(1):113-120. [8] GUTIERREZ J A,NAEVE M,CALLAWAY E,et al.IEEE802.15.4:a developing standard for low-power low-cost wireless personal area networks[J].Network,IEEE,2001,15(5):12-19. [9] YICK J,MUKHERJEE B,GHOSAL D.Wireless sensor network survey[J].Computer Networks,2008,52(12):2292-2330. [10] AKYILDIZ I F,SU W,S ANKARASUBRAMANIAM Y,et al.Wireless sensor networks:a survey[J].Computer Networks,2002,38(4):393-422. [11] AL-KARAKI J N,KAMAL A E.Routing techniques in wireless sensor networks:a survey[J].Wireless communications,IEEE,2004,11(6):6-28. [12] 李慧芳,姜胜明,韦刚.无线传感器网络中基于博弈论的路由建模[J].传感器技术学报,2007,20(9):1-3. |
No related articles found! |
|