3Chen Xiangqian, Makki K, Yen K, et al. N. Sensor Network Security: A Survey [ J]. IEEE Communications Surveys & Tutorials, 2009, 11(2): 52-73.
4Karlof C, Wagner D. Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures[ C]//Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications. Alaska: IEEE, 2003: 113-127.
5Chen Xiangqian, Makki K, Yen K, et al. Attack Distribution Modeling and Its Applications in Sensor Network Security[ J/OL]. [ 2009-11-15]. http://dl, acm. org/citation, cfm?id = 1387787&bnc = 1.
6Du Xiaojiang, Guizani M, Xiao Yang, et al. A Routing-driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks[ J]. IEEE Trans on Wireless Communications, 2009, 8(3): 1223-1229.
7Abuhelaleh M A, Mismar T M, Abuzneid A A. Armor-LEACH--Energy Efficient, Secure Wireless Networks Communication [ C]//Proceedings of the 17th International Conference on Computer Communications and Networks (ICCCN'08). Virgin Islands: IEEE, 2008: 1-7.
8Traynor P, Cao Guohong, La Porta T. The Effects of Probabilistic Key Management on Secure Routing in Sensor Networks[ C]// IEEE Wireless Communications and Networking Conference (WCNC 2006). Las Vegas: IEEE, 2006: 659-664.
9Jiang Yuanxi, Zhao Baohua. A Secure Routing Protocol with Malicious Nodes Detecting and Diagnosing Mechanism for Wireless Sensor Networks[ C]//Proceeding of the 2nd IEEE Asia-Pacific Service Computing Conference. Tsukuba Science City: IEEE, 2007: 49-55.
10Liu Fang, Cheng Xiuzhen, Chen Dengchang. Insider Attacker Detection in Wireless Sensor Networks[ C] //Proceeding of the 26th Annual IEEE Conference on Computer Communications (INFOCOM'07). Anchorage: IEEE, 2007: 1937-1945.