Akyildiz F, Su W, Sankarasubra maniam Y, and Cayirci E.Wireless sensor network: A survey[J].Computer Networks.2002,38(4):393-422[2]Eschenauer L and Gligor V. A key management schemedistributed sensor network. Proceeding of the 9th ACMConference on Computer and Communications Security,Washington. New York: ACM Press, 2002: 41-47.[3]Chan H and Perrig A, et al.. Random key predistributionschemes for sensor networks. Proceeding of the 2003 IEEESymposium on Security and Privacy, Berkeley, California.IEEE Computer Society, 2003: 197-213.[4]Camtepe S A and Yener B. Combinatorial design of keydistribution mechanisms for wireless sensor networks.Proceeding of 9th European Symposium On Research inComputer Security, Berlin. Springer-Verlag, 2004: 293-308.[5]Hongmei Deng and Anindo Mukherjee, et al.. Threshold andidentity-based key management and authentication forwireless ad hoc networks[J].Porceeding of internationalconference on information technology: coding andcomputing(ITCC04), Washington. IEEE Computer Society.2004, 2:107-111[6]Farshid delgosha and Faramarz fekri. Threshold keyestablishmentin distributed sensor networks using amultivariate scheme. Proceeding of 25th IEEE InternationalConference on Compute Communications, Barcelona,Catalunya, Spain. April, 2006: 1-12.[7]Chen Jiangwei, Xu Li, and Mu Yi. A new group Rekeyingscheme based on t-packing designs for Ad hoc networks.Proceeding of the 2nd international conference on Scalableinformation systems, Suzhou, China, ACM Press, 2007, 304:110-115.[8]许力, 郑宝玉. MANET 环境下基于能量保护的路由策略及其研究进展[J].电子与信息学报.2005, 27(5):827-834浏览[9]Erdos P and Renyi A. On random graph. Published inMathematics. Debrecen. Hungary, 6. 1959: 290-297.[10]Liu D and Ning P. Establishing pairwise keys in distributedsensor networks. Proceeding of the 10th ACM Conference onComputer and Communications Security, Washington. NewYork: ACM Press, 2003: 52-61.[11]章静, 许力, 黄榕宁. 自组网中基于可信度的分簇策略. 第二届中国可信计算与信息安全学术会议, 中国石家庄. 武汉大学学报(理学版), 2006, 52(S1): 1-4.Zhang Jing, Xu Li, and Huang Rong-ning. Trustevaluation-based clustering algorithm in an ad hoc network.Proceeding of 2nd China Trusted Computing andInformation Security Conference, Shijiazhuang, China.Journal Wuhan University(Natural Science Edition), 2006,52(S1): 1-4.
|