Perrig A, Stankovic J, and Wagner D. Security in wirelesssensor networks[J]. Communications of the ACM, 2004, 47(6):53-57.[2]Karlof C, Sastry N, and Wagner D, et al.. Tinysec: a link layersecurity architecture for wireless sensor networks[C]. The 2ndACM Conf. Embedded Networked Sensor Systems, Baltimore,Maryland, USA, Nov. 3-5, 2004: 162-175.[3]Basagni S.[J].Herrin K, and Rosti E, et al.. Secure pebblenets[C].The 2nd ACM Intl Symp. Mobile Ad hoc Networking andComputing, Long Beach, CA, USA, Oct. 04-0.2001,:-Perrig A.[J].Szewczyk R, and Wen V, et al.. SPINS: Securityprotocols for sensor networks[C]. The 7th Intl Conf. MobileComputing and Networking, Rome, Italy, Jul. 16-2.2001,:-[4]Eschenauer L and Gligor V. A key-management scheme fordistributed sensor networks[C]. The 9th ACM Conf.Computer and Communications Security, Washington, DC,USA, Nov. 17-21, 2002: 41-47.[5]Chan H, Perrig A, and Song D. Random key predistributionschemes for sensor networks[C]. The IEEE Symp. Securityand Privacy, Oakland, California, USA, May. 11-14, 2003:197-213.Zhu S.[J].Xu S, and Setia S, et al.. Establishing pair-wise keysfor secure communication in Ad Hoc networks: a probabilisticapproach[C]. The 11th IEEE Intl Conf. Network Protocols,Atlanta, Georgia, USA, Nov. 4-.2003,:-[6]Du W, Deng J, and Han Y, et al.. A pairwise keypredistribution scheme for wireless sensor networks[J].ACMTransactions on Information and System Security.2005, 8(2):228-258[7]Liu D, Ning P, and Li R. Establishing pairwise keys indistributed sensor networks[J].ACM Transactions onInformation and System Security.2005, 8(1):41-77[8]Huang D, Mehta M, and Liefvoort A V D, et al.. Modelingpairwise key establishment for random key predistribution inlarge-scale sensor networks[J].IEEE/ACM Transactions onNetworking.2007, 15(5):1204-1215[9]Law Y W.[J].Yen L H, and Pietro R D, et al.. Securek-connectivity properties of wireless sensor networks[C]. The4th IEEE Intl Conf. Mobile Ad-hoc and Sensor Systems,Pisa, Italy, Oct. 8-1.2007,:-[10]Wu J and Stinson D R. Minimum node degree andk-connectivity for key predistribution schemes anddistributed sensor networks[C]. The 1st ACM Conf. WirelessNetwork Security, Alexandria, Virginia, USA, Mar. 31-Apr. 2,2008: 119-124.[11]Camtepe S A and Yener B. Combinatorial design of keydistribution mechanisms for wireless sensor networks[J].IEEE/ACM Transactions on Networking.2007, 15(2):346-358[12]Delgosha F.[J].Ayday E, and Fekri F. MKPS: a multivariatepolynomial scheme for symmetric key-establishment indistributed sensor networks[C]. The ACM Intl WirelessCommunications and Mobile Computing Conference,Honolulu, Hawaii, USA, Aug. 12-1.2007,:-[13]Liu D and Ning P. Location-based pairwise key establishmentfor static sensor networks[C]. The 1st ACM Workshop onSecurity of Ad hoc and Sensor Networks, Fairfax, VA, USA,Oct. 31-31, 2003: 72-82.[14]Du W, Deng J, and Han Y, et al.. A key management schemefor wireless sensor networks using deployment knowledge[C].The 23rd IEEE Conf. Computer Communications, HongKong, Mar. 7-11, 2004: 586-597.[15]Liu D, Ning P, and Du W. Group-based key predistributionfor wireless sensor networks [J]. ACM Transactions on SensorNetworks, 2008, 4(2): 1-30.[16]Canh N T, Truc P T H, and Hai T H, et al.. Enhancedgroup-based key management scheme for wireless sensornetworks using deployment knowledge[C]. The 6th AnnualIEEE Consumer Communications and NetworkingConference, Las Vegas, Nevada, USA, Jan. 10-13, 2009: 1-5.[17]Zhu S, Setia S, and Jajodia S. LEAP+: efficient securitymechanisms for large-scale distributed sensor networks [J].ACM Transactions on Sensor Networks.2006, 2(4):500-528[18]Anderson R.[J].Chan H, and Perrig A. Key infection: smarttrust for smart dust[C]. The 12th IEEE Intl Conf. NetworkProtocols, Berlin, Germany, Oct. 5-.2004,:-[19]Deng J.[J].Hartung C, and Han R, et al.. A practical study oftransitory master key establishment for wireless sensornetworks[C]. The 1st IEEE/CreateNet Intl Conf. Securityand Privacy for Emerging Areas in Communication Networks,Athens, Greece, Sep. 5-.2005,:-[20]Woo A and Culler D E. A transmission control scheme formedia access in sensor networks[C]. The 7th Intl Conf.Mobile Computing and Networking, Rome, Italy, Jul. 16-21,2001: 221-235.
|