1. REN Fen-yuan, HUANG Hai-ning, LIN Chuang. Wireless sensor networks [J]. Journal of Software, 2003, 14(7): 1282–1291.
2. PEI Zhi-qiang, XU Chang-qing, TENG Jin. Node scattering manipulation based on trajectory model in wireless sensor network [J]. Journal of Central South University of Technology, 2010, 17(5): 991–999.
3. SU Zhong, LIN Chuang, FENG Fu-jun, REN Feng-yuan. Key management schemes and protocols for wireless sensor networks [J]. Journal of Software, 2007, 18(5): 1218–1231.
4. YE Fan, LUO Hai-yun, LU Song-wu, ZHANG Li-xia. Statistical en-route filtering of injected false data in sensor networks [C]// Proceedings of 23th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’ 04). Hong Kong, China, 2004: 2446–2457.
5. ZHU Sen-cun, SETIA S, JAJODIA S. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks [C]// Proceeding IEEE symposium on Security and privacy (S&P’ 04). California, USA, 2004: 259–271.