张光华,黄莉静,田立勤.地理位置路由中基于信任的安全模型[J].北京理工大学学报,2012,32(5):503-507. Zhang Guanghua, Huang Lijing, Tian Liqin. A trust based secure model for geographical routing[J]. Transactions of Beijing Institute of Technology, 2012,32(5):503-507. (in Chinese)
[2]
马立玲,郦会,王军政.基于Zigbee的数话同传技术研究[J].北京理工大学学报,2011,31 (3):299-302. Ma Liling, Li Hui, Wang Junzheng. The research of audio and data dimultaneous transmission technology based on Zigbee[J]. Transactions of Beijing Institute of Technology, 2011,31(3):299-302.(in Chinese)
[3]
Sangsoon L, Young-myoung K, Jiwoong J, et al. Design, analysis and evaluation of a new energy conserving MAC protocol for wireless sensor networks[J]. Ksii Transactions on Internet and Information Systems, 2012,6(12):3046-3060.
[4]
Lee W, Nguyen M V, Verma A. Schedule unifying algorithm extending network lifetime in S-MAC-based wireless sensor networks[J]. IEEE Transactions on Wireless Communications, 2009,8(9):4375-4379.
[5]
Kacso A F, Schipper U. Receiver-based routing service for T-MAC protocol[C]//Proceedings of 2010 Fourth International Conference on Sensor Technologies and Applications. Venice: IEEE, 2010:489-494.
[6]
Joseph P, Jason H, David C. Versatile low power media access for wireless sensor networks[C]//Proceedings of ACM International Conference on Embedded Networked Sensor Systems. Baltimore: ACM, 2004:95-107.
[7]
Yang O, Heinzelman W B. Modeling and performance analysis for duty-cycled MAC protocols with applications to S-MAC and X-MAC[J]. IEEE Transactions on Mobile Computing, 2012,11(6):905-921.