[1] 杜军朝, 刘惠, 刘传益, 等. ZigBee技术原理与实战[M]. 北京: 机械工业出版社, 2015. (Du Junchao, Liu Hui, Liu Chuanyi, et al.ZigBee Technology Principles and Practice [M]. Beijing, China: China Machine Press, 2015.) [2] 蒲国民, 郁滨, 朱璇. 一种基于邻居关系的ZigBee抗节点复制攻击方法[J]. 系统仿真学报, 2014, 26(5): 1026-1031. (Pu Guomin, Yu Bin, Zhu Xuan.Approach against Node Replication Attacks Based on Neighbor Relationships for ZigBee[J]. Journal of System Simulation (S1004-731X), 2014, 26(5):1026-1031.) [3] 周伟伟, 岳云天, 郁滨. ZigBee节点多因子身份认证方案研究[J]. 系统仿真学报. 2015, 27(4): 762-769. (Zhou Weiwei, Yue Yuntian, Yu Bin.Research of Multi-factor Identity Authentication Scheme for ZigBee Network Nodes[J]. Journal of System Simulation (S1004-731X), 2015, 27(4): 762-769. ) [4] 黄美根, 郁滨, 孔志印. ZigBee网络Sybil攻击检测方案设计[J]. 系统仿真学报, 2016, 28(6): 1452-1460. (Huang Meigen, Yu Bin, Kong Zhiyin.Sybil Attack Detection Scheme Design in ZigBee Network[J]. Journal of System Simulation (S1004-731X), 2016, 28(6): 1452-1460.) [5] Huy C, Perrig A, Johnson D B.Packet leashes a defense against wormhole attacks in wireless networks[C]// Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM). San Francisco, USA: IEEE, 2003: 1976-1986. [6] Hu L, Evans D.Using Directional Antennas to Prevent Wormhole Attacks[C]// Network and Distributed System Security Symposium, NDSS 2004, San Diego, California, USA. DBLP, 2004. [7] Lazos L, Poovendran R.SeRLoc: robust localization for wireless sensor networks[J]. ACM Transactions on Sensor Networks (S1550-4859), 2005, 1(1): 73-100. [8] Lazos L, Poovendran R.HiRLoc: high-resolution robust localization for wireless sensor networks[J]. IEEE Journal on Selected Areas in Communications (S0733-8716), 2006, 24(2): 233-246. [9] 陈鸿龙, 李鸿斌, 王智. 基于TDoA测距的传感器网络安全定位研究[J]. 通信学报, 2008, 29(8): 11-21. (Chen Honglong, Li Hongbin, Wang Zhi.Research on TdoA-based secure localization for wireless sensor networks[J]. Journal on Communications, 2008, 29(8): 11-21. ) [10] 陈鸿龙, 王志波, 王智, 等. 针对虫洞攻击的无线传感器网络安全定位方法[J]. 通信学报, 2015(3): 106-113. (Chen Honglong, Wang Zhibo, Wang Zhi, et al.Secure localization scheme against wormhole attack for wireless sensor networks[J]. Journal on Communications, 2015(3): 106-113.) [11] Honglong Chen, Wei Lou, Zhi Wang, et al.Securing DV-Hop localization against wormhole attacks in wireless sensor networks[J]. Pervasive and Mobile Computing (S1574-1192), 2015, 16(PA): 22-35. [12] Wu J, Chen H, Lou W, et al.Label-based DV-Hop localization against wormhole attacks in wireless sensor networks[C]// Proceedings of IEEE NAS. USA: IEEE, 2010: 79-88. [13] 曹晓梅, 李佳耕, 殷瑛. 基于模糊预测的Ad Hoc网络虫洞检测算法[J]. 计算机工程, 2015, 41(7): 177-183. (Cao Xiaomei, Li Jiageng, Yin Ying.Ad Hoc Network Wormhole Detection Algorithm Based on Fuzzy Prediction[J]. Computer Engineering, 2015, 41(7): 177-183.) [14] Y Niu, D Gao, P Chen, et al.A New Localization Scheme with Statistical Estimation against Wormhole Attack in Wireless Sensor Networks[J]. China Communications (S1673-5447), 2010, 7(5): 57-69. [15] Zheng J.Unique-preorder-node Based DV-Hop Localization against Wormhole Attack for Wireless Sensor Networks[J]. Journal of Information &Computational Science (S1548-7741), 2015, 12(6): 2417-2428. [16] Zhen J, Srinivas S.Preventing Replay Attacks for Secure Routing in Ad Hoc Networks[J]. Lecture Notes in Computer Science(S0302-9743), 2003, 2865: 140-150. [17] Kumari V R, Nagaraju A, Pareek G.Wormhole Attack Behaviour in Monte-Carlo Localization for Mobile Sensor Networks[J]. Journal of Sensor Technology (S2161-122X), 2014, 4(2): 48-58. |