[1]
I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, et al. Wireless Sensor Networks: a Survey. Computer Networks . 2002, 38(4): p.393–422.
DOI: 10.1016/s1389-1286(01)00302-4
Google Scholar
[2]
Sun Limin, Li Jianzhong, Chen Yu, et al.Wireless sensor networks[M].beijing: tsinghua university press,2005(in Chinese).
Google Scholar
[3]
PEI Qingqi, SHEN Yulong, MA Jianfeng.Survey of wireless sensor network security techniques [J].Journal on Communications,2007,28(08):113-122(in Chinese).
Google Scholar
[4]
Perrig A, Stankovic J, Wagner D. Security in wireless sensor networks[J]. Communications of the ACM, 2004, 47(6): 53-57.
DOI: 10.1145/990680.990707
Google Scholar
[5]
Su Z, Lin C, Feng FJ, et al.Key management schemes and protocols for wireless sensor networks [J].Journal of Software,2007,18(5), 1218-1231(in Chinese).
Google Scholar
[6]
Tague P, Poovendran R. Modeling adaptive node capture attacks in multi-hop wireless networks[J]. Ad Hoc Networks, 2007, 5(6): 801-814.
DOI: 10.1016/j.adhoc.2007.01.002
Google Scholar
[7]
Ding, W., B. Laha, et al. First stage detection of compromised nodes in sensor networks[A]. In: Sensors Applications Symposium (SAS)[C]. Ireland: IEEE, 2010: 20-24.
DOI: 10.1109/sas.2010.5439387
Google Scholar
[8]
Ding, W., Y. Yu, et al. Distributed first stage detection for node capture[A]. In: IEEE Globecom 2010 Workshop on Web and Pervasive Security[C]. Miami, USA: IEEE, 2010: 1566-1570.
DOI: 10.1109/glocomw.2010.5700202
Google Scholar
[9]
Conti, M., R. Di Pietro, et al. Mobility and cooperation to thwart node capture attacks in MANETS[J]. EURASIP Journal on Wireless Communications and Networking, 2009: 1-13.
DOI: 10.1155/2009/945943
Google Scholar
[10]
Zhou Jie, Guo Yuanbo, Hu Lingyan. Detection and control of the node capture attack in WSN for node capture [J]. Journal of Xian University. 2012, 39(1), 185-190(in Chinese).
Google Scholar
[11]
Li Deyi, Du Yi. Artificial intelligence with uncertainty. Beijing: National Defence Industry Press. 2005(in Chinese).
Google Scholar
[12]
Lv Huijun, Wang Ye, Li Deyi, et al. The Application of Backward Cloud in Qualitative Evaluation. Chinese Journal of Computers. 2003, 26(8): 1009-1015(in Chinese).
Google Scholar
[13]
Song Yuanjun, Li Deyi, Yang Xiaozong, et al. Reliability Evaluation of Electronic Products Based on Cloud Models. Acta Electronica Sinica. 2000, 28(12): 74-77(in Chinese).
Google Scholar
[14]
Information on http: /db. lcs. mit. edu/labdata/labdata. html.
Google Scholar
[15]
Heinzelman W R, Chandrakasan A, Balakrishnan H. Energy-efficient communication protocol for wireless microsensor networks[C]/System Sciences, 2000. Proceedings of the 33rd Annual Hawaii International Conference on. IEEE, 2000: 10 pp. vol. 2.
DOI: 10.1109/hicss.2000.926982
Google Scholar