7ZHANG Y C, et al. Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks [J]. Se-leeted Areas in Communieations,IEEE Journal, 2006,24 (2): 247-260.
8崔晓臣,张强.无线传感器网络安全研究[M].北京:电信科学,2010,11:15-18.
9LIU W, LUO R,YANG H Z. Cryptography Overhead Evalua- tion and Analysis for Wireless Sensor Networks. Proceedings of the 2009 WRI International Conference on Communica- tions and Mobile Computing. Washington,DC: IEEE Computer Society, 2009:496-501.
10ITU Strategy, Policy Unit(SPU). ITU Interact Reports 2005: The Internet of Things[R]. Geneva:International Telecommu- nication Union(ITU), 2005.