3Deng J, Han R, Mishra S. INSENS: intrusion-tolerant routing in wireless sensor networks [ R ]. Technical Report CUCS - 939 - 02. USA : Department of Computer Scienceof University of Colorado, 2002.
4Tanachaiwiwat S, Dave P, Bhindwale R, et al. Poster abstract secure locations: routing on trust and isolating compromised sensors in location-aware sensor networks [ C ]// Proceedings of the 1st International Conference on Embedded Networked Sensor Systems. [ S. l ] : ACM Press, 2003 : 324 - 325.
5Guimaraes G, Souto E, Sadok D, et al. Evaluation of security mechanisms in wireless sensor networks systems communications [ C ]//Proceedings of the 2005 Systems Communication. [ s. n. ], 2005:428 -433.
7HEDETNIEMI S, LIESTMAN A. A survey of gossiping and broadcasting in communication networks [ J ]. Computer Networks, 1988,18(4) :129-134.
8PERRIG A, ZEWCZYK R,WEN V. Spins: security protocols for sensor networks [ J ]. Journal of Wireless Networks,2002,8(5) :512-534.
9MANJESHWAR A AGRAWAL D. Teen: a routing protocol for enhanced efficiency in wireless sensor networks [ C ]//Syomposium Proceeding of 15th Parallel and Distributed Processing. San Francisco[ s. n. ] :2001.
10HEINZELMAN W,CHANDRAKASAN A, BALAKRISHNAN H.Energy efficient communication protocol for wireless micro sensor networks[ C]//Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.Hawaii [ s. n. ]. 2000.