[1]
A. Mishra, K. Nadkarni, A. Patcha. In: IEEE Wireless Communications, vol. 11, no. 1, p.48–60, February (2004).
Google Scholar
[2]
A. P. da Silva, M. Martins, B. Rocha, A. Loureiro, L. Ruiz, and H. C. Wong. Decentralized intrusion detection in wireless sensor networks[C]. In Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet '05). ACM Press, October 2005, p.16.
DOI: 10.1145/1089761.1089765
Google Scholar
[3]
I. Onat, A. Miri. An intrusion detection system for wireless sensor networks[C]. In Proceeding of the IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, vol. 3, Montreal, Canada, August 2005, p.253–259.
DOI: 10.1109/wimob.2005.1512911
Google Scholar
[4]
C. E. Loo, M. Y. Ng, C. Leckie, M. Palaniswami. In: International Journal of Distributed Sensor Networks, (2005).
Google Scholar
[5]
V. Bhuse, A. Gupta. In: Journal of High Speed Networks, vol. 15, no. 1, p.33–51, (2006).
Google Scholar
[6]
Zhijie Han, Weiwei Zhang, Zhiguo Chen. Computer Engineering and Science, 2010, 32(9): 27-29(in Chinese).
Google Scholar
[7]
Pei Wang, Xianwei Zhou. Chinese Journal of Sensors and Actuators, 2007, 20(3): 677-681(in Chinese).
Google Scholar
[8]
Y. Kawamoto, V.W.S. Wong, V.C.M. Leung. A two-phase scatternet formation protocol for Bluetooth wireless personal area networks[C]. In: Proc. IEEE WCNC'03. Los Alamitos, CA: IEEE Computer Society Press, 2003. 1242~1247.
DOI: 10.1109/wcnc.2003.1200600
Google Scholar
[9]
Oleg Kachirski, Ratan Guha. Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks [C]. IEEE Workshop on Knowledge Media Networking (KMN. 02). Kyoto, JAPAN, 2002: 153-158.
DOI: 10.1109/kmn.2002.1115178
Google Scholar
[10]
Guy Helmer, Johnny s. k. Wong, Vasant Honavar, et al. In: Journal of Systems and Software, 2003, (67): 109-122.
Google Scholar
[11]
Xiang Li, Xiaozong Yang. Journal of Computer Research and Development, 2006, 43(2): 211-217 (in Chinese).
Google Scholar
[12]
Hong Lin, Wenfang Ding, Qiang Gao. Journal of Computer Research and Development, 2003, 40(2): 201~207 (in Chinese).
Google Scholar