6Przydatek B, Song D, Perrig A. Sia : Secure information aggregation in sensor networks[ EB/OL ]. http://www. ce. cmu. edu/ -dawnsong/papers/sia.pdf,2006 -22 -25.
7Law Y W, Havinga P J M. How to secure a wireless sensor network[ C ]//IEEE ISSNIP,2005:89 -95.
8Hwang D D. Energy memory security tradeoffs in distributed sensor networks[ C]//3rd International Conference on Ad Hoc Networks and Wireless,2004:70-81.
9Deng J, Han R, Mishra S. INSENS: Intrusion-tolerant routing in wireless sensor networks [ R ]. Technical Report CU-CS 939-02. Departement of Computer Science, Univesity of Colorado,2002.