|
[1]Warneke, B., Last, M., Leibowitz, B and Pister, K. S. J, 2001, Smart dust: Communicating with a cubic-millimeter computer, IEEE Computer, 34(1), 44–51.
[2]孫利民、李建忠(2005),無線感測器網路[M],北京:清華大學出版社。
[3] Shih, E., Cho, S., Ickes, N., et al., Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks, Proceedings of the ACM MobiCom 2001, pp. 272–286.
[4]Liu, D., Ning P., and Du, W. K., Attack-resistant location estimation in sensor networks, Proc. of IPSN, April 2005.
[5]Douceur, J., The Sybil Attack, In First IPTPS, March 2002.
[6]黃能富(1998),區域網路與高速網路,維科出版社。
[7]IEEE Computer Society LAN MAN Standards Committee, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Standard 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, 1997.
[8]Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., and Cayirci, E., A Survey on Sensor Networks, Proc. IEEE Communications Magazine, Aug. 2002, Vol. 40, No. 8, pp. 102-113.
[9]Karl, H., and Willig, A., Protocols Architectures for Wireless Sensor Networks, first ed., Topology Control, Wiley, 2005, June 24.
[10]Liu, C., Wu, K., and He, T., Sensor localization with ring overlapping based on comparison of received signal strength indicator, IEEE Trans, 2004.
[11]Demirbas, M., Song, Y., An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks, 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks, 2006, pp. 564-570.
[12]Chang, S. H., Huang, T. S., A Fuzzy Knowledge Based Fault Tolerance Algorithm in Wireless Sensor Networks, International Conference on Advanced Information Networking and Applications Workshops, 2012 26th, pp.891-896.
[13]Piro, C., Shields, C., and Levine, B. N., Detecting the Sybil Attack in Ad hoc Networks, Proc. IEEE/ACM Intl Conf on Security and Privacy in Communication Networks (Secure Comm), August 2006.
[14]林俊良、方健安(2002)編譯,C#設計實務-徹底研究,美商麥格羅希爾國際股份有限公司。
|