[1] 吕治安. ZigBee网络原理与应用开发 [M]. 北京: 北京航空航天大学出版社, 2008. [2] Douceur J R.The sybil attack[M]// Peer-to-peer Systems. Germany: Springer Berlin Heidelberg, 2002: 251-260. [3] Abirami K, Santhi B.Sybil attack in wireless sensor network[J]. International Journal of Engineering and Technology (IJET)(S2319-8613), 2013, 5(2): 620-623. [4] Newsome J, Shi E, Song D, et al.The Sybil attack in sensor networks: analysis & defenses[C]// Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks. USA: ACM, 2004: 259-268. [5] 冯涛, 马建峰. 防御无线传感器网络攻击的新方法[J]. 通信学报, 2008, 29(6): 13-19. [6] Zhang Qinghua, Wang Pan, Douglas S, et al.Defending against Sybil attacks in sensor networks[C]// Distributed Computing Systems Workshops, 25th IEEE International Conference on. USA: IEEE, 2005: 185-191. [7] 王丽娜, 施德军, 覃伯平. 基于散列树的无线传感器网络实体认证协议[J]. 传感技术学报, 2007, 20(6): 1338-1343. [8] 王晓东, 孙言强, 孟祥旭. WSN中基于簇的Sybil攻击防御机制[J]. 计算机工程, 2009, 35(15): 129-131. [9] Karuppiah M A B, Prakash A R. SybilSecure: an energy efficient Sybil attack detection technique in wireless sensor network[J]. International Journal of Information Sciences and Techniques(IJIST)(S2319-409X), 2014, 4(3): 1081-1113. [10] Yu H, Gibbons P B, Kaminsky M, et al.Sybillimit: A near-optimal social network defense against Sybil attacks[C]// Security and Privacy, SP 2008, IEEE Symposium on. USA: IEEE, 2008: 3-17. [11] Shi L, Yu S, Lou W, et al.Sybilshield: An agent-aided social network-based Sybil defense among multiple communities[C]// INFOCOM, 2013 Proceedings IEEE. USA: IEEE, 2013: 1034-1042. [12] Lee G, Lim J, Kim D, et al.An approach to mitigating Sybil attack in wireless networks using ZigBee[C]//Advanced Communication Technology. ICACT 2008. 10th International Conference on. USA: IEEE, 2008, 2: 1005-1009. [13] Vamsi P R, Kant K.A lightweight Sybil attack detection framework for wireless sensor networks[C]// Contemporary Computing (IC3), 2014 Seventh International Conference on. USA: IEEE, 2014: 387-393. [14] Li M, Xiong Y, Wu X, et al.A regional statistics detection scheme against Sybil attacks in WSNs[C]// Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on. USA: IEEE, 2013: 285-291. [15] Demirbas M, Song Y.An RSSI-based scheme for Sybil attack detection in wireless sensor networks[C]// Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks. USA: IEEE Computer Society, 2006: 564-570. |