[1] Akyildiz I F, Pompili D, Melodia T. Underwater acoustic sensor networks: Research challenges[J]. Ad Hoc Networks, 2005,3(3):257-279.
[2] Heidemann J, Ye Wei, Wills J, et al. Research challenges and applications for underwater sensor networking[C]// Proc. of IEEE Wireless Communications & Networking Conference. 2006:228-235.
[3] Cui Junhong, Kong Jiejun, Gerla M, et al. Challenges: Building scalable and distributed underwater wireless sensor networks (UWSNs) for aquatic applications[J]. Channels, 2005:1-17.
[4] Kilfoyle D B, Baggeroer A B. The state of the art in underwater acoustic telemetry[J]. IEEE Journal of Oceanic Engineering, 2000,25(1):4-27.
[5] 魏志强,杨光,丛艳平. 水下传感器网络安全研究[J]. 计算机学报, 2012,35(8):1594-1606.
[6] Domingo M C. Securing underwater wireless communication networks[J]. IEEE Wireless Communications, 2011,18(1):22-28.
[7] Cong Yanping, Yang Guang, Wei Zhiqiang, et al. Security in underwater sensor network[C]// Proc. of the 2010 International Conference on Communications and Mobile Computing. 2010:162-168.
[8] Dini G, Duca A L. A cryptographic suite for underwater cooperative applications[C]// Proceedings of 2011 IEEE Symposium on Computers and Communications. 2011:870-875.
[9] Ji E K, Yun N Y, Muminov S, et al. Security in underwater acoustic sensor network: Focus on suitable encryption mechanisms[J]. Communications in Computer & Information Science, 2012,324:160-168.
[10]Peng Chunyan, Du Xiujuan, Li Keqin, et al. An ultra-lightweight encryption scheme in underwater acoustic networks[J]. Journal of Sensors, 2016(3):1-10.
[11]Alvarez G and Li S. Some basic cryptographic requirements for chaos-based crypto systems[J]. International Journal of Bifurcation & Chaos, 2011,16(8):2129-2151.
[12]He Yuan, Tian Simei. Block encryption algorithm based on chaotic S-box for wireless sensor network[J]. Journal of Computer Applications, 2013,33(4):1081-1084.
[13]Lian Shiguo. A block cipher based on chaotic neural networks[J]. Neurocomputing, 2009,72(4-6):1296-1301.
[14] Liu Hongjun, Wang Xingyuan. Color image encryption based on one-time keys and robust chaotic maps[J]. Computers and Mathematics with Applications, 2010,59(10)3320-3327.
|