1D W Carman, P S Kruus and B J Matt. Constraints and Approaches for Distributed Sensor Network Security[R]. NAI Labs Technical Report #00-010, September 2000.
2C Karlof and D Wagner.Secure Routing in Wireless Sensor Networks:Attacks and Countermeasures[M].First IEEE International Workshop on Sensor Network Protocols and Applications,May 2003.
4Kemal Akkaya and Mohamed Younis.A Survey on Routing Protocols for Wireless Sensor Networks[M].November 2003.
5C Intanagonwiwat,R Govindan and D Estrin. Directed diffusion:A scalable and robust communication paradigm for sensor networks[C]. In the Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'00),Boston, MA,August 2000.
6W Heinzelman,A Chandrakasan and H Balakrishnan.Energy-efficient communication protocol for wireless sensor networks[C].in the Proceeding of the Hawaii International Conference System Sciences,Hawaii,January 2000.
7Y Yu,D Estrin and R Govindan.Geographical and Energy-Aware Routing:A Recursive Data Dissemination Protocol for Wireless Sensor Networks[R].UCLA Computer Science Department Technical Report,UCLA-CSD TR-01-0023,May 2001.
8Deng J,Han R,Mishra S.INSENS:intrusion-tolerant routing in wireless sensor networks[A].The 23rd IEEE International Conference on Distributed Computing Systems[C].http://www.cs.colorado.edu/~ mishras/research/papers/icdcs03-2.pdf,2003.
9Tanachaiwiwat S,Dave P,Bhindwale R,et al.Secure locations:routing on trust and isolating compromised sensors in location-aware sensor networks[EB/OL].http://www.cens.ucla.edu/sensys03/proceedings/p324-tanachaiwiwat.pdf,2003.