[1] 周旋, 孙力娟, 黄海平, 等. 一种基于隐私保护的无线传感网聚类方法研究[J]. 系统仿真学报, 2013, 25(10): 2294-2299. (Zhou Xuan, Sun Li-juan, Huang Hai-ping, et al.Clustering Method Based on Privacy Preserving for Wireless Sensor Network[J]. Journal of System Simulation (S1004-731X), 2013, 25(10): 2294-2299.) [2] 于雍, 雷凤宇, 王寿武, 等. 多跳无线网络中基于身份的解决方案[J]. 系统仿真学报, 2014, 26(8): 1725-1732. (Yu Yong, Lei Feng-yu, Wang Shou-wu, et al.Efficient IBE Solution Applied to Multi-hop Radio Networks[J]. Journal of System Simulation (S1004-731X), 2014, 26(8): 1725-1732.) [3] 王伟. 无线传感器网络安全技术研究 [D]. 太原: 太原理工大学, 2011. (Wang Wei.A Research on Security Technology of Wrieless Sensor Network [D]. Taiyuan, China: Taiyuan University of Science and Technology, 2011.) [4] 宓小土, 高峰, 章白瑜, 等. 无线传感器网络安全性问题[J]. 解放军理工大学学报(自然科学版), 2011, 12(1): 42-47. (Mi Xiao-tu, Gao Feng, Zhang Bai-yu, et al.Security in wireless sensor networks[J]. Journal of PLA University of Science and Technology (Natural Science Edition), 2011, 12(1): 42-47.) [5] 苏忠, 林闯, 封富君, 等. 无线传感器网络密钥管理的方案和协议[J]. 软件学报, 2007, 18(5): 1218-1231. (Su Zhong, Lin Chuang, Feng Fu-jun, et al.Key Management Schemes and Protocols for Wireless Sensor Networks[J]. Journal of Software, 2007, 18(5): 1218-1231.) [6] 王桂良, 路友荣, 韩猛, 等. 基于压缩感知的认知无线网络协作频谱感知技术[J]. 系统仿真学报, 2013, 25(6): 1247-1251. (Wang Gui-liang, Lu You-rong, Han Meng, et al.Novel Cooperative Spectrum Sensing Method Based on Compressed Sensing for Cognitive Radio Networks[J]. Journal of System Simulation (S1004-731X), 2013, 25(6): 1247-1251.) [7] D L Donoho.Compressed Sensing[J]. IEEE Transactions on Information Theory (S0018-9448), 2006, 52(4): 1289-1306. [8] S Agrawal, S Vishwanath.Secrecy using Compressive Sensing[C]// Information Theory Workshop, IEEE Conference Publications, Paraty, Brazil, Oct. 2011. USA: IEEE, 2001: 563-567. [9] E J Candes, T Tao.Decoding by Linear Programming[J]. IEEE Transactions on Information Theory (S0018-9448), 2005, 51(12): 4203-4215. [10] Baraniuk R, Davenport M, De Vore R, et al.A Simple Proof of the Restricted Isometry Property for Random Matrices[J]. USA: Constructive Approximation,(S1432-0940), 2008, 28(3): 253-263. [11] Debbah M, El-Gamal H, Poor H V, et al.Wireless Physical Layer Security[J]. EURASIP Journal on Wireless Communications and Networking (S1687-1499), 2010(3): 1-2. [12] Shirazi G N, Lampe L.A compressive sensing approach for secret key agreement based on UWB channel reciprocity[C]// Ultra-Wideband (ICUWB), 2012 IEEE International Conference on. USA: IEEE, 2012: 135-139. [13] Hestenes M R.Multiplier and gradient methods[J]. Journal of Optimization Theory and Applications (S1573-2878),1969, 4(5): 303-320. |