[1] Perrig A, Stankovic J, Wagner D.Security in wireless sensor networks[J]. Communications of the ACM.ISSN:(S1617-7975), 2004, 47(6): 53-57. [2] Bankovic Z, Fraga D, José M, et al. Detecting and confining sybil attack in wireless sensor networks based on reputation systems coupled with self-organizing maps[C]// IFIP Advances in Information and Communication Technology. NanChang,China: Springer, 2010: 311-318. [3] Roszainiza Rosli, Yusnani Mohd Yusoff, Habibah Hashim.Performance Analysis of ID-Based Authentication on Zigbee Transceiver[C]// 2012 IEEE Symposium on Wireless Technology and Applications, Bandung, Indonesia, 2012. USA: IEEE, 2012. [4] S Weis.Security and Privacy in Radio Frequency Identification Device [D]. Cambridge, MA, USA: MIT, 2003. [5] Weis S A, Sarma S E, Rivest R L.Security and Privacy Aspects of Low-cost Radio Frequency Identification System[C]// Proceedings of the 1st International Conference on Security in Pervasive Computing. Berlin, Germany: Springer-Verlag, 2004: 201-212. [6] Watro R, Kong D, Cuti S, et al. TinyPK: Securing sensor networks with public technology[C]// Proceedings of the 2nd ACM Workshop on Security of Ad Hoc Networks and Sensor Networks. Washington DC, USA: ACM, 2004: 59-64. [7] Eschenauer L, Gligor V D.A key-management scheme for distributed sensor networks[C]// Proceedings of the 9th ACM Conference on Computer and Communications Security, New York, USA. USA: ACM, 2002: 41-47. [8] Zinaida Benenson, Nils Gedicke, Ossi Raivio.Realizing Robust User Authentication in Sensor Networks[C]// Workshop on Real World Wireless Sensor Networks (REALWSN). Italy: Springer,2005: 135-142. [9] K Bauer, H Yunyoung Lee.A Distributed Authentication Scheme for a Wireless Sensing System[C]// Proceedings of the 2nd International Workshop on Networked Sensing Systems (INSS 2005). Japan: IEEE, 2005: 210-215. [10] Wei Chen, Xiaoshuan Zhang, Dong Tian, Zetian Fu.An Identity-Based Authentication Protocol for Clustered ZigBee Network[C]// 6th International Conference on Intelligent Computing. Changsha, China: Springer, 2010: 503-510. [11] 金晨辉, 郑浩然, 张少武, 等. 密码学[M]. 北京: 高等教育出版社, 2009, 11. |