1Karp B, Kung H T. GPSR:Greedy perimeter stateless routing for wireless networks [ C ]//Proceedings of ACM Mobi Corn 2000, 2000:243 --254.
2Xu Y, Heidemann J, Estrin D. Geography-informed energy conservation for Ad Hoc routing [ C ],//Proceedings of ACM Mobi Com 2000, Rome, Italy ,2001.
3Wellenhoff B H, Lichtenegger H, Collins J. Global positions system:Theory and practice [ M ]. 4th Ed ( S1 ) : Springer Verlag, 1997.
4Douceur J. The sybil attack [ C ]// Proc of IPTPS 2002, Cambridge, MA, USA ,2002.
5Hu Yih-Chun,Perrig A,Johnson D B. Wormhole attacks in wireless networks [ J ]. Selected Areas in Communications, IEEE Journal ,2006,24 (2) :370 --380.
6Sastry N, Shankar U, Wagner D. Secure verification of location claims[ C]//Proc of the 2003 ACM Workshop on Wireless Security ( WISE' 03 ), San diego, California,2003 : 1 -10.
7Capkun S, Cagalj M, Srivastava M. Secure localization with hidden and mobile base stations[ C ]///Proc of the 25th Annual Joint Conference of the IEEE Computer and Communications Societies ( INFOCOM ' 06 ), Barcelona, Spain ,2006:23 -29.
8Iazos L, Poovendran R. SeRLoc:Secure range-independent locali- zation for wireless sensor networks[ C]//Proc of the 2004 ACM Workshop on Wireless Security (WISE' 04), Brisbane, Australia, 2004:21 --30.
9Moses R, Krishnamurthy D, Patterson R. A self-localization method for wireless sensor networks [ J ]. EURASIP Journal on Applied Signal Processing 2003,4:348 --358.
10Karl H, Willig A. Protocols and architectures for wireless sensor networks [ M ]. England : John Wiley& Sons, Ltd, West Sussex, 2005.