[1] Du Y,Yang S,Zhang R H.Design of an intrusion detection system for wireless sensor networks[J].Sensor Letters,2011,9(5):2 082-2 086.
[2]Huang J Y,Liao I E,Chung Y F,et al.Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining[J].Information Sciences,2013,231:32-44.
[3]傅蓉蓉,郑康锋,芦天亮,等.基于危险理论的无线传感器网络入侵检测模型[J].通信学报,2012,33(9):31-37.
[4]Yan K Q,Wang S C,Wang S S,et al.Hybrid intrusion detection system for enhancing the security of a cluster-based wireless sensor network[C]//Proceedings of the 3rd IEEE International Conference on Computer Science and Information Technology(ICCSIT’10).Chengdu:IEEE,2010:114-118.
[5]Sedjelmaci H,Feham M.Novel hybrid intrusion detection system for clustered wireless sensor network[J].International Journal of Network Security and Its Applications,2011,3(4):1-14.
[6]Bao F,Chen I R,Chang M J.Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection[J].IEEE Transactions on Network and Service Management,2012,9(2):169-183.
[7]Srikanth H,Shroff N B,Saurabh B.Secure neighbor discovery through overhearing in static multihop wireless networks[J].Computer Networks,2011,55(6):1 229-1 241.
[8]Liu B,Olivier D,Philippe N.Dynamic coverage of mobile sensor networks[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(2):301-311.
[9]Gao J,Hu G,Yao X.Anomaly detection of network traffic based on wavelet packet[C]//Proceedings of the Asia-Pacific Conference on Communications.Busan,Korea:APCC,2006:1-5.