[1]
Mark Chaffey, Larry Bird, Jon Erickson, et al. MBARI's buoy based seafloor observatory design[C]. MTTS/IEEE Techno-Ocean'04[C], 9-12 Nov.2004, 4:1975-1984.
DOI: 10.1109/oceans.2004.1406447
Google Scholar
[2]
Sun Gui-zhi, Sang En-fang. An energy-efficient routing protocol for underwater acoustic sensor network[J]. Technical Acoustics, 2007(1):134-136.
Google Scholar
[3]
Liu Shao-wei, Luo Dan-yan, Xiang Lin, Zuo De-cheng. Energy-Balanced Topology Control Algorithm of Wireless Sensor Network[J]. Journal of University of Electronic Science and Technology of China, 2010(4):89-93.
Google Scholar
[4]
Wang Yan-mei. Research on Topology Control Algorithm in Wireless Sensor Networks[D]. Xi Dian University, 2009.
Google Scholar
[5]
Rice J A, Creber B, et al. Evolution of Seaweb Underwater Acoustic Networking[A]. Proceedings of Oceans Conference Record (IEEE)[C].2000:2007-2017.
Google Scholar
[6]
Shi E, Perrig A. Designing Secure Sensor Networks[J]. IEEE Wireless Communication Magazine, 2004(12):38-43.
DOI: 10.1109/mwc.2004.1368895
Google Scholar
[7]
Wills J, Ye Wei, Heidemann J. Low-power acoustic modem for dense underwater sensor networks[C] Proceedings of the 1st ACM Int Workshop on Under Water Networks. New York:ACM,2006:79-85
DOI: 10.1145/1161039.1161055
Google Scholar
[8]
Gong Hai-gang, et al. Distributed Energy Efficient Data Gathering in Wireless Sensor Networks[J]. Acta Electronica Sinica, 2005(8).
Google Scholar
[9]
Zhu Sencun. LEAP : efficient security mechanisms for large-scale distributed sensor networks[C]. In the proceedings of the 10th ACM conference on computer and communications security ,Oct . 2003 :62272.
DOI: 10.1145/948109.948120
Google Scholar
[10]
J. Kong, Z. Ji, W. Wang, M. Gerla, R. Bagrodia, and B. Bhar-gava. Low-cost Attacks against Packet Delivery, Localization and Synchronization Services in Under-Water Sensor Networks. In Fourth ACM Workshop on Wireless Security (WiSe), 2005.
DOI: 10.1145/1080793.1080808
Google Scholar
[11]
I. Khalil, S. Bagchi, and N. B. Shroff, "LITEWORP: A Lightweight Countermeasure for the Wormhole attack in multihop wireless network, in International Conference on Dependable Systems and Networks(DSN), 2005.
DOI: 10.1109/dsn.2005.58
Google Scholar
[12]
L. Hu and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. In Network and Distributed System Security Symposium (NDSS), 2004.
Google Scholar
[13]
Newsome J . The sybil attack in sensor networks: analysis & defense[C] . Proceedings of the third international symposium on information proceeding in sensor networks. ACM press ,2004 :2592268.
DOI: 10.1145/984622.984660
Google Scholar
[14]
Huang Zhen, Ye Ding-fen. Efficient key management scheme in wireless sensor networks[J]. Computer Engineering and Design, 2009, 30(1):25-28.
Google Scholar
[15]
Jing Deng , Richard Han and Shivakant Mishra. INSENS : intrusion-tolerant routing in wireless sensor networks [R] . TR CU2CS2939202 , University of Colorado.
DOI: 10.1016/j.comcom.2005.05.018
Google Scholar
[16]
Liu Qing, Wang Pei-kang. Secure and Energy-Efficient Clustered Routing Protocol for Wireless Sensor Networks [J]. Computer Simulation, 2009(4).
Google Scholar
[17]
M. Demirbas and Y. Song. An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks. In Proc. of International Workshop on Advanced Experimental Activities on Wireless Networks and Systems, June 2006.
DOI: 10.1109/wowmom.2006.27
Google Scholar