[1]Yick J, Mukherjee B, Ghosal D. Wireless sensor network survey[J]. Computer Networks, 2008,52(12):2292-2330.
[2]Chan Haowen, Perrig A, Przydatek B, et al. SIA: Secure information aggregation in sensor networks[J]. Journal of Computer Security, 2007,15(1):69-102.
[3]Ozdemir S. Functional reputation based reliable data aggregation and transmission for wireless sensor networks[J]. Computer Communications, 2008,31(17):3941-3953.
[4]Okamoto T, Uchiyama S. A new publickey cryptosystem as secure as factoring[C]// Advances in Cryptology(EUROCRYPT’98). Springer Berlin Heidelberg, 1998:308-318.
[5]Paillier P. Trapdooring discrete logarithms on elliptic curves over rings[C]// Advances in Cryptology(ASIACRYPT’2000). Springer Berlin Heidelberg, 2000:573-584.
[6]He Wenbo, Liu Xue, Nguyen H V, et, al. PDA: Privacypreserving data aggregation for information collection[J]. ACM Transactions on Sensor Networks (TOSN), 2011,8(1):1-
22.
[7]Ozdemir S, Xiao Yang. Integrity protecting hierarchical concealed data aggregation for wireless sensor networks[J]. Computer Networks, 2011,55(8):1735-1746.
[8]李同锋,杜秀娟,牛昆. 基于分层的层内无线传感网络数据融合[J]. 现代电子技术, 2014(20):11-13.
[9]王万良, 陈陪俊, 郑建炜, 等. 一种基于LEACH的无线传感器路由算法及其仿真[J]. 系统仿真技术, 2008,4(2):75-79.
[10]于立娟, 李思敏. 无线传感器网络LEACH改进算法的设计与仿真[J]. 光通信研究, 2008(5):67-70.
[11]苏均宇,曾子维,石嘉鹏. 基于定向扩散路由协议的改进[J]. 传感技术学报, 2007,20(3):673-676.
[12]Ganesan D, Govindan R, Shenker S, et al. Highlyresilient, energyefficient multipath routing in wireless sensor newtorks[J]. Mobile Computing and Communications
Review, 2011,1(2):1-13.
[13]Felemban E, Lee C, Ekici E, et al. Probabilistic QoS guarantee in reliability and timeliness domains in wireless sensor networks[C]// Proceedings of the 24th Annual
Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005). 2005:2646-2657.
[14]毕俊蕾,任新会,郭拯危. 无线传感器网络路由协议分类研究[J]. 计算机技术与发展, 2010,18(5):131-137.
[15]Callaway B E H. Wireless Sensor Networks Architectures and Protocols[M]. CRC Press, 2012:255-257. |