共 11 条
- [1] Culler D., Estrin D., Srivastava M., Guest editors' introduction: overview of sensor networks, IEEE Computer, 37, 8, pp. 41-49, (2002)
- [2] Ren F.-Y., Huang H.-N., Lin C., Wireless sensor networks, Journal of Software, 14, 7, pp. 1282-1291, (2003)
- [3] Lei L.-T., The reseearch of authentication and key exchange mechanism for wireless communication, (2015)
- [4] Wang H.-Y., Research on key technology of data reliable transimission in wireless sendor networks, (2017)
- [5] Diffie W., Hellman M.E., New directions in cryptography, IEEE Transactions on Information Theory, 22, 6, pp. 644-654, (1976)
- [6] He D., Wang D., Robust biometrics-based authentication scheme for multi-server environment, IEEE Systems Journal, 9, 3, pp. 816-823, (2015)
- [7] Xue K., Ma C., Hong P., Et al., A temporal-credential-based mutual authentication and key agreement scheme for wireless sensor networks, Journal of Network and Computer Applications, 36, 1, pp. 316-323, (2013)
- [8] Lin H.Y., Location-based data encryption for wireless sensor network using dynamic keys, Wireless Networks, 21, 8, pp. 2649-2656, (2015)
- [9] Yu B.-B., Wu X.-Y., Chu J.-F., Et al., Signature protocol for wireless sensor network based on group key agreement, Journal of Jilin University (Engineering and Technology Edition), 47, 3, pp. 924-929, (2017)
- [10] Ma S., A terminal location verification protocol for collision attack, (2018)