共 31 条
[11]
[Anonymous], 2005, 4301 RFC
[13]
Casado L, 2009, LECT NOTES COMPUT SC, V5838, P133, DOI 10.1007/978-3-642-04766-4_10
[14]
Sensor Network Security: A Survey
[J].
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS,
2009, 11 (02)
:52-73
[15]
Granjal J, 2010, GLOB TELECOMM CONF
[16]
Why is IPSec a viable option for Wireless Sensor Networks
[J].
2008 FIFTH IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1 AND 2,
2008,
:802-807
[17]
Grant JE, 2010, PATHOLOGICAL GAMBLING: GUIDE CLINICAL TREATMENT, P1, DOI 10.1007/978-88-470-1538-8
[18]
Sizzle: A standards based end-to-end security architecture for the embedded Internet
[J].
Third IEEE International Conference on Pervasive Computing and Communications, Proceedings,
2005,
:247-256
[19]
Hui J., 2011, RFC 6282
[20]
Hui JW, 2008, SENSYS'08: PROCEEDINGS OF THE 6TH ACM CONFERENCE ON EMBEDDED NETWORKED SENSOR SYSTEMS, P15