JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 123-128.doi: 10.6040/j.issn.1671-9352.2.2014.333
Previous Articles Next Articles
LI Guo-qing
CLC Number:
[1] TAO Shu, KRUNZ M, LIU Si. Secure data collection in wireless sensor networks using randomized dispersive routes[J]. IEEE Transactions on Mobile Computing, 2010, 9(7): 941-954. [2] PROBST M J, KASERA S K. Statistical trust establishment in wireless sensor networks[C]//Proceedings of 2007 International Conference on Parallel and Distributed Systems. Washington: IEEE Computer Society, 2007: 1-8. [3] GANERIWAL S, BALZANO L K, SRIVASTAVA M B. Reputation-based framework for high integrity sensor networks[J]. ACM Transactions on Sensor Networks, 2008, 4(3): 1-37. [4] 成坚,冯仁剑,许小丰,等.基于D-S证据理论的无线传感器网络信任评估模型[J].传感技术学报,2009, 22(12):1802-1807. CHENG Jian, FENG Renjian, XU Xiaofeng, et al. Trust evaluation model based on D-S evidence theory in wireless sensor networks[J]. Chinese Journal of Sensors and Actuators, 2009, 22(12): 1802-1807. [5] 高建斌,娄渊胜.基于模糊逻辑分类的WSN Sinkhole侦测[J].计算机工程,2011, 39(9):178-180. GAO Jianbin, LOU Yuansheng. Sinkhole detection based on fuzzy logic classification for WSN [J]. Computer Engineering, 2011, 39(9): 178-180. [6] 冯欣,杨华民,宋小龙.WSN中改进的节点复制攻击检测方法[J].计算机工程,2011, 37(23):121-123, 134. FENG Xin, YANG Huamin, SONG Xiaolong. Improved detection method of node replication attack in wireless sensor network[J]. Computer Engineering, 2011, 37(23): 121-123, 134. [7] KHALIL I, BAGCHI S, ROTARU C N, et al. UNMASK:utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks[J]. Ad Hoc Networks, 2010, 8(1): 148-164. [8] MADRIA S, YIN Jian. SeRWA: a secure routing protocol against wormhole attacks in sensor networks[J]. Ad Hoc Networks, 2009, 7(6): 1051-1063. [9] 王万军.不确定集对分析探索[J].河北理工大学学报:自然科学版,2008, 30(3):67-69. WANG Wanjun. On uncertain set pair analysis [J]. Journal of Hebei Institute of Technology: Natural Science Edition, 2008, 30(3): 67-69. [10] ROMAN R, ZHOU Jianying, LOPEZ J. Applying intrusion detection systems to wireless sensor networks[C]//Proceedings of the 3rd IEEE Consumer Communications and Networking Conference(CCNC 2006). Washington: IEEE Computer Society, 2006: 640-644. [11] BANERJEE S, GROSAN C, ABRAHAM A. IDEAS: intrusion detection based on emotional ants for sensors[C]//Proceedings of 2005 International Conference on Intelligent Systems Design and Applications (ISDA '05). Wroclaw,Poland:[s.n.], 2005: 344-349. |
[1] | ZHAO Feng, XU Xiu. An improved DV-hop algorithm based on iterative computation and two communication ranges for sensor network localization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 31-37. |
[2] | ZHOU Xian-cun, LI Ming-xi, LI Rui-xia, XU Ming-juan, LING Hai-bo. Research on the multi-point collaboration detection against replication attacks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 54-65. |
[3] | WAN Zhi-ping. An authentication protocol based on hybrid Das protocol for wireless sensor networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(05): 12-17. |
[4] | ZHAO Ze-mao1, LIU Yang1, ZHANG Fan1,2, ZHOU Jian-qin1, ZHANG Pin1. Research on source location privacy routing based on angle and probability in wireless sensor networks [J]. J4, 2013, 48(09): 1-9. |
[5] | WAN Run-ze1, LEI Jian-jun1, YUAN Cao2. An optimization strategy for managing dormant nodes in wireless sensor networks base on fuzzy clustering [J]. J4, 2013, 48(09): 17-21. |
[6] | L Jia-liang1,2,3, WANG Ying-long1,3, CUI Huan-qing1, WEI Nuo2,3, GUO Qiang2,3. Study on the node localization schemes of three dimensional wireless sensor networks based on particle swarm optimization [J]. J4, 2013, 48(05): 78-82. |
[7] | CUI Huan-qing1,2, WANG Ying-long1*, L Jia-liang1,2, WEI Nuo1. Distributed node localization based on the stochastic particle swarm optimization [J]. J4, 2012, 47(9): 51-55. |
[8] | GUO Xiao-dong1, DU Peng1, ZHANG Xue-fen2. A energy-efficient distributed detection and power allocation algorithm in wireless sensor networks [J]. J4, 2012, 47(9): 60-64. |
[9] | YAO Wu-jun1, DING Yi1,WEI Li-xian1, YANG Xiao-yuan1,2. An ARQ error control scheme based on RSSI in wireless sensor networks [J]. J4, 2011, 46(9): 61-66. |
[10] | ZHOU Shu-wang1,2,3, WANG Ying-long1,3, GUO Qiang1,2, WEI Nuo1,2, GUO Wen-juan1,3. A new method for localization based on network coverage and intelligent search [J]. J4, 2010, 45(11): 27-31. |
[11] | GUO Wen-juan1,2, WANG Ying-long1,2, Wei Nuo1,3, GUO Qiang1,3, ZHOU Shu-wang1,2,3. A time synchronization protocol for wireless sensor networks based on the Kalman filter [J]. J4, 2010, 45(11): 32-36. |
[12] | ZHOU Shu-Wang, WANG Yang-Long, GUO Jiang, WEI Nuo. Particle swarm optimizationbasedwireless sensor network nodes localization method [J]. J4, 2009, 44(9): 52-55. |
[13] | ZHANG Xian-yi ,WANG Ying-long ,GUO Qiang,ZHAO Hong-lei . Research on the indoors channel fading model in WSN [J]. J4, 2008, 43(11): 44-47 . |
|