[1] Wang Q,Zhu YY,Cheng L.Reprogramming wireless sensor networks:challenges and approaches[J].IEEE Networks,2006,20(3):48-55. [2] Hui J W,Culler D E.The dynamic behavior of a data dissemination protocol for network programming at scale[C]//Proc.of ACM International Conference on Embedded Networked Sensor Systems,Baltimore,MD,USA,2004:81-94. [3] Kulkarni S S,Wang L.MNP..multihop network reprogramming service for sensor networks[C]//Proc.of the 25th IEEE International Conference on Distributed Computing Systems(ICDCS 2005),Columbus,Ohio,USA,2005:7-16. [4] Lanigan P E,Gandhi R,Narasimhan P.Sluice:secure dissemination of code updates in sensor networks[C]//Proc.of the 26th IEEE International Conference on Distributed Computing Systems,Lisbon,Portugal,2006:53-62. [5] Dutta P K,Hui J W,Chu D C,et al.Securing the deluge network programming system[C]//Prec.of the Fifth International Conference on Information Processing in.Sensor Networks,Nashville,TN,USA,2006:326-333. [6] Deng J,Han R,Mishra S.Secure code distribution in dynamically programmable wireless sensor networks[C]//Proc.of the International Conference on Information Processing in Sensor Networks,Nashville,TN,USA,2006:292-300. [7] Shi E,Perrig A.Designing secure sensor networks[J].IEEE Wireless Communications,2004,11(6):38-43. [8] Aaraj N,Raghunathan A,Ravi S,et al.Energy and execution time analysis of a software-hased trusted platform module[C]//Prec.of the Design Automation and Test in Europe,Nice,France,2007:1128-1133. [9] Seshadri A,Perrig A,Doom L V,et al.SWATT:SoftWarebased ATTestation for Embedded Devices[C]//Proc.of the IEEE Security & Privacy Conference,Oakland,CA,USA,2004:272-282. [10] Shaneck M,Mahadevan K,Kher V,et al.Remote softwarebased attestation for wireless sensors[C]//Proc.of the 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks(ESAS),Visegrad,Hungary,2005:27-41. [11] Kim D H,Gandhi R,Narasimhan P.Exploring symmetric cryptography for secure network reprogramming[C]//Proc.of the 4th Workshop on Wireless Ad hoc and Sensor Networks WWASN2007,Toronto,Canada,2007:17-24. [12] Gennaro R,Rohatgi P.How to sign digital streams[J].Information and Computation,2001,166(1):100-116. |