[1]
Li Jianzhong, Gao hong, Advances in wireless sensor network, Computer Research and Development, 2008(01).
Google Scholar
[2]
Tang yong, Zhou mingtian , Advances in wireless sensor network routing protocols, Journal of Software, 2006(03).
Google Scholar
[3]
Pang Liaojun, Jiao Licheng, Design and Analysis of Secure Routing Protocol for Wireless Sensor Networks, Chinese Journal of Sensors and Actuators, 2008(09).
Google Scholar
[4]
LI Ting, FENG Yong, Survey on secure routing research in wireless sensor networks, Application Research of Computers, 2012(12).
Google Scholar
[5]
Wang Y. Topology control for wireless sensor networks[J]. Wireless Sensor Networksand Applications, 2008: 113-147.
DOI: 10.1007/978-0-387-49592-7_5
Google Scholar
[6]
Akyildiz I, Vuran M. Wireless sensor networks[M]. Wiley Publishing, Inc (2010).
Google Scholar
[7]
Bortniko V, Chockler G, Roytman A, et al. Bulletin board: a scalable and robust eventually consistent shared memory over a peer-to-peer overlay[J]. ACM SIGOPS Operating Systems Review, 2010, 44(2): 64-70.
DOI: 10.1145/1773912.1773929
Google Scholar
[8]
M. Hamzeh,S. Arab S.M. Fakhraie,C. Lucas. An Improvement on LEACH Algorithm with a Fuzzy Processor . IEICE (2008).
Google Scholar
[9]
Wei Bo Hu Han-ying Fu Wen. An Improved LEACH Protocol for Data Bring and Aggregation in wrelss Sensor Networks. IEEE computer society. 2008. 398-401.
DOI: 10.1109/iccee.2008.59
Google Scholar