5Perrig A,Canetti R,Tygar J D,et al. Efficient authentication and signature of multicast streams over lossy channels[C]//Proceedings of the IEEE Symposium on Research in Security and Privacy. Oakland, California, USA : [s. n. ], 2000 : 56-73.
6Perrig A, Szewczyk R, Wen V, et al. SPINS : security protocols for sensor networks [J]. Wireless Networks, 2002 (8):521-534.
7Liu D, Ning P, Zhu S, et al. Practical broadcast authentication in sensor networks[C]//MobiQuitous.[S. l. ] :IEEE Computer Society ,2005 : 118-132.
8ZHOU L, HAAS Z J. Securing Ad hoc Networks[J]. IEEE Networks, 1999, 13(6): 24-30.
9LUO H, ZERFOS P, KONG J, et al. Self-securing Ad Hoc Wireless Networks[C]. In: 7th 1EEE Symp on Computers and Communications, 2002. 567-574.
10KHALILI A, KATZ J, ARBAUGH W A. Towards Secure Key Distribution in Truly Ad Hoc Networks[C]. In: Proc. oflEEE Workshop on Security and Assurance in Ad hoc Networks, 2003.