2I F Akyildiz,W Su,Y Sankarasubramaniam,et al.Wireless sensor networks:a survey[J].IEEE Communication Magazine,2002,40(8):102-114.
3X Cao,J Chen,Y Sun.An interface designed for networked monitoring and control in wireless sensor networks[J].Computer Standards & Interfaces,2009,31(3):579-585.
4Adrian Perrig,Robert Szewczyk.SPINS:Security protocols for sensor network[J].Wireless Networks,2002,8(5):521-534.
5M Maróti,B Kusy,G Simon,et al.The flooding time synchronization protocol[C] //Conference On Embedded Networked Sensor Systems.Baltimore,MD,USA,2004.
6R Ahlswede, N Cai, S Y R Li .Network information flow [J]. IEEE Trans on Information Theory,2000,46 (4) : 1204-1216.
7R K Ahuja ,T L Magnanti, J B Odin. Network Flows:Theory,Algorithms, and Applications [M].Englewood Cliffs, NJ :Prentice Hall,1993.
8T Ho, D R Karger, M Medard.The benefits of coding over routing in a randomized setting [C]. IEEE Int' 1 Syrup on Information Theory ( ISIT), Pacifieo Yokohama, Yokohama. 2003.
9Sachin Katti, Hariharan Rahul. XORs in the Air:. Practical Wireless Network Coding [J].IEEE transaeitons on network eoding,2008,16(3): 479-510.
10Shravan Rayanchu,Sayandeep Sen.Loss-aware network coding for unicast wireless sessions: design, implement Ion and performance evaluation [J].SIGMETRICS Perform. Eval Rev, 2008,1(36):85-96.