LEE S,CHOI Y.A secure alternate path routing in sensornetworks[J].Computer Communications,2006,30(1):153-165.
[2]
PERRIG A,SZEWCZYK R,TYGAR J,et al.SPINS:security protocols for sensor networks[J].ACM WirelessNetworks,2002,8(5):521-534.
[3]
STAVROU E,PITSILLIDES A.A survey on securemultipath routing protocols in WSNs[J].ComputerNetworks,2010,54(13):2215-2238.
[4]
DENG Jing,HAN R,MISHRA S.INSENS:intrusion-tolerant routing for wireless sensor networks[J].ComputerCommunications,2006,29(2):216-230.
[5]
LEE P,MISRA V,RUBENSTEIN D.Distributedalgorithms for secure multipath routing in attack-resistantnetworks[J].IEEE/ACM Transactions on Networking,2007,15(6):1490-1501.
[6]
DENG Jing,HAN Y.Multipath key establishment forwireless sensor networks using just-enough redundancytransmission[J].IEEE Transactions on Dependable andSecure Computing,2008,5(3):177-190.
LUO Jun,HUBAUX J.Joint mobility and routing forlifetime elongation in wireless sensor networks[C]∥ProcIEEE INFOCOM.Piscataway:IEEE,2005,3:1735-1746.
[9]
LIU An,NING Peng.TinyECC:a configurable library forelliptic curve cryptography in wireless sensor networks[C]∥Proc 2008 International Conference on InformationProcessing in Sensor Networks.Piscataway:IEEEComputer Society,2008:245-256.