[1]
S. H. Jokhio, I. A. Jokhio, A. H. Kemp. Node capture attack detection and defence in wireless sensor networks[J]. Wireless Sensor Systems, IET, 2012, 2(3): 161-169.
DOI: 10.1049/iet-wss.2011.0064
Google Scholar
[2]
L. Sun, J. Li, Y. Chen, et al.Wireless sensor networks[M].beijing: tsinghua university press,2005(in Chinese).
Google Scholar
[3]
Q. Pei, Y. Shen, J. Ma.Survey of wireless sensor network security techniques [J].Journal on Communications,2007,28(08):113-122(in Chinese).
Google Scholar
[4]
A. Perrig, J. Stankovic, D. Wagner. Security in wireless sensor networks[J]. Communications of the ACM, 2004, 47(6): 53-57.
DOI: 10.1145/990680.990707
Google Scholar
[5]
Z. Su, C Lin, F. Feng, et al.Key management schemes and protocols for wireless sensor networks [J].Journal of Software,2007,18(5), 1218-1231(in Chinese).
Google Scholar
[6]
W. Ding, B. Laha, et al. First stage detection of compromised nodes in sensor networks[A]. In: Sensors Applications Symposium (SAS)[C]. Ireland: IEEE, 2010: 20-24.
DOI: 10.1109/sas.2010.5439387
Google Scholar
[7]
W. Ding, Y. Yu, et al. Distributed first stage detection for node capture[A]. In: IEEE Globecom 2010 Workshop on Web and Pervasive Security[C]. Miami, USA: IEEE, 2010: 1566-1570.
DOI: 10.1109/glocomw.2010.5700202
Google Scholar
[8]
J. Zhou, Y. Guo, L. Hu. Detection and control of the node capture attack in WSN for node capture [J]. Journal of Xian University. 2012, 39(1), 185-190(in Chinese).
Google Scholar
[9]
P. Lu, G. W. Zhang, X. B. Xu, et al. First Stage Detection of Node Capture Attacks in WSN Based on Cloud Model[J]. Advanced Materials Research, 2014, 834: 905-912.
DOI: 10.4028/www.scientific.net/amr.834-836.905
Google Scholar
[10]
X. Sheng, Y. Hu. Distributed particle filters for wireless sensor network target tracking[C]. IEEE International Conference on Acoustics, Speech and Signal Processing, Philadelphia, 2005: 845-848.
DOI: 10.1109/icassp.2005.1416141
Google Scholar
[11]
J. Lin, W. Xiao, F. L. Lewis, et al. Energy-efficient distributed adaptive multi-sensor scheduling for target tracking in wireless sensor networks [J]. IEEE Transactions on Instrumentation and Measurement, 2009, 58(6): 1886 -1896.
DOI: 10.1109/tim.2008.2005822
Google Scholar
[12]
J. Zhan, H. Liu, S. Liu. The Study of Dynamic Degree Weighted Centroid Localization Algorithm Based on RSSI [J]. Acta Electronica Sinica., 2011, 9(1): 82-88(in Chinese).
Google Scholar
[13]
Wang S, Zhu X, Yang F. Efficient QoS management for QoS-aware web service composition. Int J Web Grid Serv, 2014, 10(1): 1-23.
DOI: 10.1504/ijwgs.2014.058763
Google Scholar
[14]
Wang S, Zhu X, Sun Q, Zou H, Yang F. Low-Cost Web Service Discovery Based on Distributed Decision Tree in P2P Environments. Wireless Personal Communications, 2013, 73(4): 1477-1493.
DOI: 10.1007/s11277-013-1261-2
Google Scholar
[15]
Shang guang W, Zibin Z, Qibo S, Hua Z, Fangchun Y. Cloud model for service selection. IEEE INFOCOM 2011 - IEEE Conference on Computer Communications Workshops, 10-15 April 2011. IEEE, 2011. pp.666-671.
DOI: 10.1109/infcomw.2011.5928896
Google Scholar
[16]
Wang SG, Sun QB, Yang FC. Towards Web Service selection based on QoS estimation. International Journal of Web and Grid Services, 2010, 6(4): 424-443.
DOI: 10.1504/ijwgs.2010.036406
Google Scholar