1. Wireless sensor networks: a survey [J];AKYILDIZ;Computer Networks,2002
2. PERRIG A, SZEWCZYK R, WEN V, et al. SPINS: Security protocols for sensor networks [C] // Proceedings of Seventh Annual International Conference on Mobile Computing and Networks, Jul 16–21, 2001, Rome, Italy. New York, NY, USA: ACM Press, 2001:189–199.
3. ANDERSON R, KUHN M. Tamper resistance—–a cautionary note [C] // Proceedings of the 2nd Usenix Workshop on Electronic Commerce, Nov 18–21, 1996, Oakland, CA, USA. SanDiego, CA, USA: USENIX Press, 1996: 1–11.
4. Mechanism of authentication and key agreement in WCDMA [J];XIAO;Journey of Chongqing University of Posts and Telecommunications,2004
5. ESCHENAUER L, GLIGOR V D. A key-management scheme for distributed sensor networks[C] // Proceedings of the 9th ACM Conference on Computer and Communications Security, Nov 18–22, 2002, Washington, DC, USA. New York, NY, USA: ACM Press, 2002: 41–47.