[1] Anish A,Prabal D,Sandp B,et al.A line in the sand:A wireless sensor network for target detection,classification and tracking[J].Computer Networks:The international Joumal of Distributed Informatique,2004,46(5):605-634. [2]Luo Liqian,Abdelzaher T F,He Tian,et al.Stankovic:Design and comparison of lightweight group manage-ment strategies in envirosuite[A].DCOSS'05:International Conference on Distributed Computing in Sensor Networks[C].Marina del Rey,CA,USA:Springer,2005:155-172. [3]Joseph H,Scherrer W,Grund C.A cyberspace command and control model[M].Montgomery,Alabama,USA:Air University Press,2009. [4]周未,张宏,李千目,等.赛搏空间网络安全体系结构演化与设计方法探讨[J].无线互联科技,2011(6):3-5,9. Zhou Wei,Zhang Hong,Li Qianmu,et al.The evaluation and design method of cyber space security architecture[J].Wireless Network Technology,2011(6):3-5,9. [5]周未,张宏,李千目,等.“数字珍珠港”时代的到来:赛博网络空间简介[J].网络与信息,2011(10):38-39. Zhou Wei,Zhang Hong,Li Qianmu,et al.The coming era of‘digital pearl harbour':Introduction of cyber space[J].Network and Information,2011(10):38-39. [6]周未,张宏,李千目,等.浅谈赛博网络空间[J].计算机与信息技术,2011(10):36-37,40. Zhou Wei,Zhang Hong,Li Qianmu,et al. Brief discussion on cyber space network[J].Computer and Information Techology,2011(10):36-37,40. [7]Acs G,Butty'an L,Vajda I.The security proof of a link-state routing protocol for wireless sensor networks[A].IEEE International Conference on Mobile Adhoc and Sensor System(MASS)[C].Pisa,Italy:IEEE,2007. [8]Li Ping,Lin Yaping,Zeng Weini.Search on security in sensor networks[J].Journal of Software,2006,17(12):2577-2588. [9]王佳昊,秦志光,蓝天,等.一种改进的无线传感器网络随机密钥预分配算法[J].电子科技大学学报(自然科学版),2006,35(4):710-713. Wang Jiahao,Qin Zhiguang,Lan Tian,et al.An improved random key predistribution scheme in wireless sensor network[J].Jounal of University of Eliectronic Science and Technology of China(Natural Science Edition),2006,35(4):710-713. [10]陈秀真,郑庆华,管晓宏,等.层次化网络安全威胁态势量化评估方法[J].软件学报.2006,4(17):885-897. Chen Xiuzhen,Zheng Qinghua,Guan Xiaohong,et al.Quantitative hierarchical threat evaluation model for network security[J].Journal of Software,17(4):885-897. [11]张宏,贺也平,石志国.基于周期时间限制的自主访问控制委托模型[J].计算机学报,2006,8(29):1427-1437. Zhang Hong,He Yeping,Shi Zhiguo.A delegation model for periodicity constraints based DAC[J].Chinese Journal of Computers,2006,8(29):1427-1437. [12]Fabien A,Jean-Marie B.An application of the context transfer protocol:Ipsec in a IPv6 mobility environment[J].International Journal of Communication Networks and Distributed Systems,2008,1(1):110-126.